Jason E. Holt

According to our database1, Jason E. Holt authored at least 13 papers between 2002 and 2006.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2006
Key Privacy for Identity Based Encryption.
IACR Cryptol. ePrint Arch., 2006

Logcrypt: forward security and public verification for secure audit logs.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

2005
Logcrypt: Forward Security and Public Verification for Secure Audit Logs.
IACR Cryptol. ePrint Arch., 2005

Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes.
IACR Cryptol. ePrint Arch., 2005

On the Job Training
CoRR, 2005

The One Page Model Checker
CoRR, 2005

2004
Content-triggered trust negotiation.
ACM Trans. Inf. Syst. Secur., 2004

Concealing Complex Policies with Hidden Credentials.
IACR Cryptol. ePrint Arch., 2004

2003
Two Security Symposia.
IEEE Secur. Priv., 2003

Hidden Credentials.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

Trust Negotiation in Dynamic Coalitions.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

TrustBuilder: Negotiating Trust in Dynamic Coalitions.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Selective disclosure credential sets.
IACR Cryptol. ePrint Arch., 2002


  Loading...