Javier Herranz
Orcid: 0000-0001-5141-7234
According to our database1,
Javier Herranz
authored at least 93 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
On remote electronic voting with both coercion resistance and cast-as-intended verifiability.
J. Inf. Secur. Appl., August, 2023
Coercion-Resistant Cast-as-Intended Verifiability for Computationally Limited Voters.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Secure IT Systems, 2022
2021
IACR Cryptol. ePrint Arch., 2021
How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
2020
2019
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications.
IACR Cryptol. ePrint Arch., 2019
2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
J. Cryptol., 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Appl. Algebra Eng. Commun. Comput., 2016
Proceedings of the Financial Cryptography and Data Security, 2016
2015
Revisiting distance-based record linkage for privacy-preserving release of statistical datasets.
Data Knowl. Eng., 2015
2014
Int. J. Inf. Sec., 2014
Des. Codes Cryptogr., 2014
Des. Codes Cryptogr., 2014
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Theor. Comput. Sci., 2012
Inf. Fusion, 2012
Identity-Based Encryption with Master Key-Dependent Message Security and Applications.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience.
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
IEEE Trans. Knowl. Data Eng., 2011
Inf. Process. Lett., 2011
Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
2010
Adv. Math. Commun., 2010
Appl. Algebra Eng. Commun. Comput., 2010
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010
Proceedings of the Advances in Cryptology, 2010
2009
Math. Comput., 2009
J. Univers. Comput. Sci., 2009
Inf. Process. Lett., 2009
Inf. Process. Lett., 2009
Proceedings of the Modeling Decisions for Artificial Intelligence, 2009
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
Proceedings of the Artificial Intelligence Research and Development, 2009
2008
IEEE Trans. Computers, 2008
Inf. Process. Lett., 2008
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Privacy in Statistical Databases, 2008
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008
2007
Int. J. Secur. Networks, 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Des. Codes Cryptogr., 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2004
Int. J. Inf. Sec., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
A formal proof of security of Zhang and Kim's ID-based ring signature scheme.
Proceedings of the Security In Information Systems, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Progress in Cryptology, 2003
Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures.
Proceedings of the Financial Cryptography, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002