Robert R. Enderlein
Robert R. Enderlein
Google
Geverifieerd e-mailadres voor e7n.ch - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Oblivious transfer with hidden access control from attribute-based encryption
J Camenisch, M Dubovitskaya, RR Enderlein, G Neven
International Conference on Security and Cryptography for Networks, 559-579, 2012
382012
Universal composition with responsive environments
J Camenisch, RR Enderlein, S Krenn, R Küsters, D Rausch
International Conference on the Theory and Application of Cryptology and …, 2016
282016
Two-server password-authenticated secret sharing UC-secure against transient corruptions
J Camenisch, RR Enderlein, G Neven
IACR International Workshop on Public Key Cryptography, 283-307, 2015
232015
Concepts and languages for privacy-preserving attribute-based authentication
J Camenisch, M Dubovitskaya, RR Enderlein, A Lehmann, G Neven, ...
Journal of information security and applications 19 (1), 25-44, 2014
222014
D2. 2 Architecture for attribute-based credential technologies-final version
P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, I Krontiris, ...
ABC4TRUST project deliverable. Available online at https://abc4trust. eu …, 2014
152014
Janus Dam Nielsen, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri, and Michael Stausholm. Architecture for Attribute-based Credential Technologies-Final …
P Bichsel, J Camenisch, M Dubovitskaya, RR Enderlein, S Krenn, ...
82015
An architecture for privacy-abcs
P Bichsel, J Camenisch, M Dubovitskaya, RR Enderlein, S Krenn, ...
Attribute-based Credentials for Trust, 11-78, 2015
72015
Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn
J Camenisch, RR Enderlein, V Shoup
European Symposium on Research in Computer Security, 19-37, 2013
72013
H2. 2–ABC4Trust architecture for developers
P Bichsel, J Camenisch, M Dubovitskaya, RR Enderlein, I Krontiris, ...
ABC4Trust heartbeat H 2, 2, 2013
72013
Secure Management of Certificates for Industrial Control Systems
S Obermeier, R Schierholz, H Hadeli, RR Enderlein, A Hristova, T Locher
6*
Privacy-preserving attribute-based credentials
JL Camenisch, RR Enderlein, A Lehmann, G Neven
US Patent 10,079,686, 2018
32018
Memory erasability amplification
J Camenisch, RR Enderlein, U Maurer
International Conference on Security and Cryptography for Networks, 104-125, 2016
32016
Composite interference pulsation dampener
V Michlin, I Stukanov
US Patent App. 10/079,686, 2003
22003
Practical composable cryptographic protocols resistant against adaptive attacks
RR Enderlein
ETH Zurich, 2016
12016
D4. 2 final reference implementation
T Baignères, P Bichsel, RR Enderlein, H Knudsen, K Damgård, J Jensen, ...
ABC4-Trust, IBM Res., Zürich, Switzerland, 2014
12014
Anonymous Access Control with Attribute-Based Encryption
RR Enderlein
Thesis is submitted in partial fulfillment of the requirements for the …, 2011
12011
Traitor tracing for obfuscated credentials
JL Camenisch, RR Enderlein, A Lehmann, G Neven
US Patent App. 16/051,761, 2018
2018
Traitor tracing for obfuscated credentials
JL Camenisch, RR Enderlein, A Lehmann, G Neven
US Patent 10,104,088, 2018
2018
Password-based generation and management of secret cryptographic keys
J Camenisch, R Enderlein, S Krenn, A Lehmann, G Neven
US Patent 10,057,060, 2018
2018
Password-based generation and management of secret cryptographic keys
J Camenisch, R Enderlein, S Krenn, A Lehmann, G Neven
US Patent 9,847,877, 2017
2017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20