Zulfikar Ramzan

According to our database1, Zulfikar Ramzan authored at least 33 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Identifying and Mitigating the Security Risks of Generative AI.
Found. Trends Priv. Secur., 2023

Identifying and Mitigating the Security Risks of Generative AI.
CoRR, 2023

2010
Phishing Attacks and Countermeasures.
Proceedings of the Handbook of Information and Communication Security, 2010

2007
Drive-By Pharming.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Phishing Attacks: Analyzing Trends in 2006.
Proceedings of the CEAS 2007, 2007

2006
Fast Algorithms for the Free Riders Problem in Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2006

Secure Distributed Human Computation.
Proceedings of the Security Protocols, 2006

Identity-Based Aggregate Signatures.
Proceedings of the Public Key Cryptography, 2006

IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.
Proceedings of the Advances in Information and Computer Security, 2006

Explicit Exclusive Set Systems with Applications to Broadcast Encryption.
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), 2006

A Method for Making Password-Based Key Exchange Resilient to Server Compromise.
Proceedings of the Advances in Cryptology, 2006

2005
End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media.
IEEE J. Sel. Areas Commun., 2005

Towards a model of energy complexity for algorithms [mobile wireless applications].
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Single-Database Private Information Retrieval with Constant Communication Rate.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Secure Distributed <i>Human</i> Computation.
Proceedings of the Financial Cryptography and Data Security, 2005

Towards understanding algorithmic factors affecting energy consumption: switching complexity, randomness, and preliminary experiments.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005

Password authenticated key exchange using hidden smooth subgroups.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology, 2005

2004
Provable Cryptographic Security and its Applications to Mobile Wireless Computing.
Wirel. Pers. Commun., 2004

Efficient Dissemination of Personalized Information Using Content-Based Multicast.
IEEE Trans. Mob. Comput., 2004

Efficient Constructions of Variable-Input-Length Block Ciphers.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

QuasiModo: Efficient Certificate Validation and Revocation.
Proceedings of the Public Key Cryptography, 2004

RSA Accumulator Based Broadcast Encryption.
Proceedings of the Information Security, 7th International Conference, 2004

Microcredits for Verifiable Foreign Service Provider Metering.
Proceedings of the Financial Cryptography, 2004

A System for End-to-End Authentication of Adaptive Multimedia Content.
Proceedings of the Communications and Multimedia Security, 2004

Eliminating Random Permutation Oracles in the Even-Mansour Cipher.
Proceedings of the Advances in Cryptology, 2004

2002
Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive.
Proceedings of the Selected Areas in Cryptography, 2002

2001
A study of Luby-Rackoff ciphers.
PhD thesis, 2001

Security for wireless internet access.
Bell Labs Tech. J., 2001

2000
On the Round Security of Symmetric-Key Cryptographic Primitives.
Proceedings of the Advances in Cryptology, 2000

1999
Towards Making Luby-Rackoff Ciphers Optimal and Practical.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions.
Proceedings of the Advances in Cryptology, 1999

1998
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash.
Proceedings of the Financial Cryptography, 1998


  Loading...