Artigos com autorizações de acesso público - Moti YungSaiba mais
1 artigo não disponível publicamente
Special issue on advanced persistent threat
J Chen, C Su, KH Yeh, M Yung
Future Generation Computer Systems 79, 243-246, 2018
Autorizações: National Natural Science Foundation of China
27 artigos disponíveis publicamente
Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares
B Libert, M Joye, M Yung
Proceedings of the 2014 ACM symposium on Principles of distributed computing …, 2014
Autorizações: European Commission
Cybersecurity dynamics: A foundation for the science of cybersecurity
S Xu
Proactive and dynamic network defense, 1-31, 2019
Autorizações: US Department of Defense
Concise multi-challenge CCA-secure encryption and signatures with almost tight security
B Libert, M Joye, M Yung, T Peters
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
Autorizações: European Commission
Practical" signatures with efficient protocols" from simple assumptions
B Libert, F Mouhartem, T Peters, M Yung
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Autorizações: National Fund for Scientific Research, Belgium, European Commission
Let a non-barking watchdog bite: Cliptographic signatures with an offline watchdog
SSM Chow, A Russell, Q Tang, M Yung, Y Zhao, HS Zhou
IACR International Workshop on Public Key Cryptography, 221-251, 2019
Autorizações: US National Science Foundation, Research Grants Council, Hong Kong
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
R Chen, X Huang, M Yung
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
Autorizações: National Natural Science Foundation of China
Proactive secure multiparty computation with a dishonest majority
K Eldefrawy, R Ostrovsky, S Park, M Yung
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
Autorizações: US National Science Foundation, US Department of Defense
Anamorphic encryption: private communication against a dictator
G Persiano, DH Phan, M Yung
Annual International Conference on the Theory and Applications of …, 2022
Autorizações: Agence Nationale de la Recherche
Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
J Devevey, B Libert, K Nguyen, T Peters, M Yung
IACR International Conference on Public-Key Cryptography, 659-690, 2021
Autorizações: A*Star, Singapore, European Commission, Agence Nationale de la Recherche
Seeking foundations for the science of cyber security: Editorial for special issue of information systems frontiers
S Xu, M Yung, J Wang
Information Systems Frontiers 23 (2), 263-267, 2021
Autorizações: US National Science Foundation, US Department of Defense
Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme
B Libert, K Nguyen, T Peters, M Yung
Annual International Conference on the Theory and Applications of …, 2021
Autorizações: National Fund for Scientific Research, Belgium, A*Star, Singapore, European …
Concurrent Knowledge Extraction in Public-Key Models
ACC Yao, M Yung, Y Zhao
Journal of Cryptology 29 (1), 156-219, 2016
Autorizações: National Natural Science Foundation of China
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved
Y Wang, R Chen, G Yang, X Huang, B Wang, M Yung
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
Autorizações: National Natural Science Foundation of China
Brief announcement: secure self-stabilizing computation
S Dolev, K Eldefrawy, J Garay, MV Kumaramangalam, R Ostrovsky, ...
Proceedings of the ACM Symposium on Principles of Distributed Computing, 415-417, 2017
Autorizações: US National Science Foundation, US Department of Defense
Communication-efficient (proactive) secure computation for dynamic general adversary structures and dynamic groups
K Eldefrawy, S Hwang, R Ostrovsky, M Yung
Security and Cryptography for Networks: 12th International Conference, SCN …, 2020
Autorizações: US National Science Foundation, US Department of Defense, US Office of the …
Privacy threats in e-shopping (position paper)
J Diaz, SG Choi, D Arroyo, AD Keromytis, FB Rodriguez, M Yung
Data Privacy Management, and Security Assurance: 10th International Workshop …, 2016
Autorizações: Government of Spain
Secure efficient history-hiding append-only signatures in the standard model
B Libert, M Joye, M Yung, T Peters
Public-Key Cryptography--PKC 2015: 18th IACR International Conference on …, 2015
Autorizações: European Commission
{End-to-Same-End} Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage
L Chen, YN Li, Q Tang, M Yung
31st USENIX Security Symposium (USENIX Security 22), 2353-2370, 2022
Autorizações: US National Science Foundation, National Natural Science Foundation of China
A concise bounded anonymous broadcast yielding combinatorial trace-and-revoke schemes
XT Do, DH Phan, M Yung
International conference on applied cryptography and network security, 145-164, 2020
Autorizações: Agence Nationale de la Recherche
As informações de publicação e financiamento são determinadas automaticamente por um programa de computador