|||Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE) , In Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security (Elisa Bertino Haya Shulman Michael Waidner, ed.), Springer, volume , 2021. |
|||Generic Plaintext Equality and Inequality Proofs , In Financial Cryptography and Data Security - 25th International Conference, FC 2021 (Claudia Diaz Nikita Borisov, ed.), Springer, volume , 2021. |
||| SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting , In IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019, IEEE, 2019.
|||Anonymizable Ring Signature Without Pairing , In Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers (Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquín García-Alfaro, eds.), Springer, 2016. |
||| Two Secure Anonymous Proxy-based Data Storages , In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016. (Christian Callegari, Marten van Sinderen, Panagiotis G. Sarigiannidis, Pierangela Samarati, Enrique Cabello, Pascal Lorenz, Mohammad S. Obaidat, eds.), Springer, 2016.