Jacques Traoré
According to our database1,
Jacques Traoré
authored at least 61 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023
2022
2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Constant-Size Lattice-Based Group Signature with Forward Security in the Standard Model.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
How colored passwords can improve the usability of coercion-resistant internet voting systems.
Proceedings of the IHC '20: XIX Brazilian Symposium on Human Factors in Computing Systems, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
2015
Proc. Priv. Enhancing Technol., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Information Security Theory and Practice, 2015
2014
Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
2013
Proceedings of the E-Voting and Identify - 4th International Conference, 2013
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
2012
On the Implementation of a Pairing-Based Cryptographic Protocol in a Constrained Device.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
Proceedings of the Information Security, 12th International Conference, 2009
2008
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 4th Workshop on Digital Identity Management, 2008
2007
Proceedings of the E-Voting and Identity, First International Conference, 2007
Proceedings of the Provable Security, 2007
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007
2006
Proceedings of the Financial Cryptography and Data Security, 2006
2004
Int. J. Comput. Math., 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
2003
Proceedings of the Financial Cryptography, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2001
Discret. Appl. Math., 2001
2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
An Efficient Fair Off-Line Electronic Cash System with Extensions to Checks and Wallets with Observers.
Proceedings of the Financial Cryptography, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997