dblp.uni-trier.dewww.uni-trier.de

John Malone-Lee

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
17EEKamel Bentahar, Pooya Farshim, John Malone-Lee, Nigel P. Smart: Generic Constructions of Identity-Based and Certificateless KEMs. J. Cryptology 21(2): 178-199 (2008)
16EEMichel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. J. Cryptology 21(3): 350-391 (2008)
2007
15EEMichel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart: Identity-Based Traitor Tracing. Public Key Cryptography 2007: 361-376
14EEDennis Hofheinz, John Malone-Lee, Martijn Stam: Obfuscation for Cryptographic Purposes. TCC 2007: 214-232
2006
13EEMichel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart: Identity-Based Encryption Gone Wild. ICALP (2) 2006: 300-311
12EESattam S. Al-Riyami, John Malone-Lee, Nigel P. Smart: Escrow-free encryption supporting cryptographic workflow. Int. J. Inf. Sec. 5(4): 217-229 (2006)
2005
11EEMichel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. CRYPTO 2005: 205-222
10EEJohn Malone-Lee: A General Construction for Simultaneous Signing and Encrypting. IMA Int. Conf. 2005: 116-135
9EEAlexander W. Dent, John Malone-Lee: The Physically Observable Security of Signature Schemes. IMA Int. Conf. 2005: 220-232
8EELiqun Chen, John Malone-Lee: Improved Identity-Based Signcryption. Public Key Cryptography 2005: 362-379
7EEEike Kiltz, Gregor Leander, John Malone-Lee: Secure Computation of the Mean and Related Statistics. TCC 2005: 283-302
6EEJohn Malone-Lee: Signcryption with Non-interactive Non-repudiation. Des. Codes Cryptography 37(1): 81-109 (2005)
2003
5EEJohn Malone-Lee, Wenbo Mao: Two Birds One Stone: Signcryption Using RSA. CT-RSA 2003: 211-225
4EEEike Kiltz, John Malone-Lee: A General Construction of IND-CCA2 Secure Public Key Encryption. IMA Int. Conf. 2003: 152-166
2002
3EEJacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart: Flaws in Applying Proof Methodologies to Signature Schemes. CRYPTO 2002: 93-110
2EEJohn Malone-Lee, Nigel P. Smart: Modifications of ECDSA. Selected Areas in Cryptography 2002: 1-12
1EESteven D. Galbraith, John Malone-Lee, Nigel P. Smart: Public key signatures in the multi-user setting. Inf. Process. Lett. 83(5): 263-266 (2002)

Coauthor Index

1Michel Abdalla [11] [13] [15] [16]
2Sattam S. Al-Riyami [12]
3Mihir Bellare [11] [16]
4Kamel Bentahar [17]
5Dario Catalano [11] [13] [16]
6Liqun Chen [8]
7Alexander W. Dent [9] [13] [15]
8Pooya Farshim [17]
9Steven D. Galbraith [1]
10Dennis Hofheinz [14]
11Eike Kiltz [4] [7] [11] [16]
12Tadayoshi Kohno [11] [16]
13Tanja Lange [11] [16]
14Gregor Leander [7]
15Wenbo Mao [5]
16Gregory Neven [11] [13] [15] [16]
17Pascal Paillier [11] [16]
18Duong Hieu Phan [15]
19David Pointcheval [3]
20Haixia Shi [11] [16]
21Nigel P. Smart [1] [2] [3] [12] [13] [15] [17]
22Martijn Stam [14]
23Jacques Stern [3]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)