Agile Cryptographic Solutions for the Cloud, e&i Elektrotechnik und Informationstechnik, 2017. ,
Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements, Privacy and Identity Management, vol.476, pp.79-96, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01619744
Opportunities and Challenges of CREDENTIAL-Towards a Metadata-Privacy Respecting Identity Provider, Privacy and Identity Management, vol.498, pp.76-91, 2016. ,
, ISO/IEC: ISO/IEC 24760: A Framework for Identity Management-Part 1: Terminology and Concepts, Part 2: Reference Framework and Requirements, vol.3, 2011.
, Attribute-based Credentials for Trust: Identity in the Information Society, 2015.
CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing, ARES 2016, pp.742-749, 2016. ,
Towards the Adoption of Secure Cloud Identity Services, ARES 2017, vol.90, pp.1-90, 2017. ,
Homomorphic Signature Schemes, LNCS, vol.2271, pp.244-262, 2002. ,
Divertible Protocols and Atomic Proxy Cryptography, EUROCRYPT 98, vol.1403, pp.127-144, 1998. ,
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Commun. ACM, vol.24, pp.84-88, 1981. ,
Security Without Identification: Transaction Systems to Make Big Brother Obsolete, Commun. ACM, vol.28, pp.1030-1044, 1985. ,
Formal Treatment of Privacy-Enhancing Credential Systems, SAC 2015, vol.9566, pp.3-24, 2015. ,
Towards Attribute-Based Credentials in the Cloud, Cryptology and Network Security-CANS 2017, 2017. ,
Towards a New Paradigm for Privacy and Security in Cloud Services, Cyber Security and Privacy, vol.530, pp.14-25, 2015. ,
Cloud Security and Privacy by Design, E-Democracy Citizen Rights in the World of the New Computing Paradigms, vol.570, pp.202-206, 2015. ,
, PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. In: 11th International Conference on Availability, Reliability and Security, pp.733-741, 2016.
How to Share a Secret, Communications of the ACM, 1979. ,
Safeguarding cryptographic keys, AFIPS National Computer Conference, 1979. ,
Computing on Authenticated Data, TCC 2012, vol.7194, pp.1-20, 2012. ,
Efficient Signature Schemes Supporting Redaction, Pseudonymization, and Data Deidentification, ASIACCS 08, pp.353-362, 2008. ,
Chameleon-Hashes with Ephemeral Trapdoors-And Applications to Invisible Sanitizable Signatures, Part II, vol.10175, pp.152-182, 2017. ,
Efficient certification and zero-knowledge proofs of knowledge on infrastructure topology graphs, vol.14, pp.69-80, 2014. ,
Fully-anonymous short dynamic group signatures without encryption. IACR Cryptology ePrint Archive, p.154, 2016. ,
Batch-verifiable Secret Sharing with Unconditional Privacy, Proceedings of the 3rd International Conference on Information Systems Security and Privacy, vol.1, pp.303-311, 2017. ,
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System, 11th International Conference on Availability, Reliability and Security, pp.88-97, 2016. ,
Security processor with quantum key distribution, Application-Specific Systems, Architectures and Processors, pp.37-42, 2008. ,
Key management of quantum generated keys in IPSEC, SECRYPT 2008-International Conference on Security and Cryptography, pp.177-183, 2008. ,
In: Malicious Clients in Distributed Secret Sharing Based Storage Networks, pp.206-214, 2017. ,
The Archistar Secret-Sharing Backup Proxy, Proceedings of the 12th International Conference on Availability, Reliability and Security. ARES '17, vol.88, pp.1-88, 2017. ,
ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing, Cloud Computing Technology and Science (CloudCom), pp.371-378, 2015. ,
Automated Information Flow Analysis of Virtualized Infrastructures, ESORICS 11, 2011. ,
Cloud Radar: near real-time detection of security failures in dynamic virtualized infrastructures, ACSAC, vol.14, pp.26-35, 2014. ,
Proactive security analysis of changes in virtualized infrastructures, ACSAC 15, 2015. ,
Signatures and efficient proofs on committed graphs and NP-statements, FC 15, pp.293-314, 2015. ,
A signature scheme with efficient protocols, SCN 2002, vol.2576, pp.268-289, 2003. ,
Efficient attributes for anonymous credentials, ACM CCS, pp.345-356, 2008. ,
Efficient attributes for anonymous credentials, TISSEC, vol.15, p.30, 2012. ,
Geo-location separation of virtualized systems, 2017. ,