A Virtualization Assurance Language for Isolation and Deployment, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, 2011. ,
DOI : 10.1109/POLICY.2011.10
Secure Proxy Signature Schemes for Delegation of??Signing??Rights, Journal of Cryptology, vol.22, issue.8, pp.57-115, 2012. ,
DOI : 10.1109/RISP.1991.130793
Functional Signatures and Pseudorandom Functions, pp.501-519, 2014. ,
DOI : 10.1007/978-3-642-54631-0_29
Concepts around privacy-preserving attribute-based credentials making authentication with anonymous credentials practical, Privacy and Identity Management for Emerging Services and Technologies, pp.53-63, 2013. ,
DOI : 10.1007/978-3-642-55137-6_4
Homomorphic Signatures and Message Authentication Codes, SCN. LNCS, pp.514-519, 2014. ,
DOI : 10.1007/978-3-319-10879-7_29
Efficient certification and zero-knowledge proofs of knowledge on infrastructure topology graphs, Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, pp.69-80, 2014. ,
Signatures and efficient proofs on committed graphs and NP-statements, 19th International Conference on Financial Cryptography and Data Security, pp.293-314, 2015. ,
Homomorphic Signature Schemes, LNCS, pp.244-262, 2002. ,
DOI : 10.1007/3-540-45760-7_17
ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 2015. ,
DOI : 10.1109/CloudCom.2015.71
Towards a New Paradigm for Privacy and??Security in Cloud Services, Communications in Computer and Information Science, vol.58, issue.2, pp.14-25978, 2015. ,
DOI : 10.1145/2641562
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Content Extraction Signatures, 2002. ,
DOI : 10.1007/3-540-45861-1_22