Xavier Boyen
According to our database1,
Xavier Boyen
authored at least 105 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles.
IEEE Trans. Dependable Secur. Comput., 2024
IACR Commun. Cryptol., 2024
2023
Cryptogr., June, 2023
An asset-backed decentralised finance instrument for food supply chains - A case study from the livestock export industry.
Comput. Ind., May, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations.
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
IEEE Access, 2022
Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers?
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications.
IEEE Trans. Veh. Technol., 2021
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!
IEEE Trans. Inf. Forensics Secur., 2021
Theor. Comput. Sci., 2021
Theor. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
EURASIP J. Wirel. Commun. Netw., 2021
Cryptogr., 2021
Integrating On-chain and Off-chain Governance for Supply Chain Transparency and Integrity.
CoRR, 2021
From premise to practice of social consensus: How to agree on common knowledge in blockchain-enabled supply chains.
Comput. Networks, 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach.
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
2019
J. Math. Cryptol., 2019
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019
Proceedings of the Australasian Computer Science Week Multiconference, 2019
2018
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
Blockchain-Free Cryptocurrencies. A Rational Framework for Truly Decentralised Fast Transactions.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Electronic Voting - First International Joint Conference, 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Australasian Computer Science Week Multiconference, 2016
Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Proceedings of the Provable Security, 2015
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
2011
J. Cryptol., 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the Identity-Based Cryptography, 2009
Proceedings of the Identity-Based Cryptography, 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
J. Cryptol., 2008
Int. J. Appl. Cryptogr., 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems.
RFC, December, 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 2006 IEEE Information Theory Workshop, 2006
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Advances in Cryptology, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Advances in Cryptology, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
2003
Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography.
IACR Cryptol. ePrint Arch., 2003
2002
1999
Automatic induction of fuzzy decision trees and its application to power system security assessment.
Fuzzy Sets Syst., 1999
Proceedings of the UAI '99: Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence, Stockholm, Sweden, July 30, 1999
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999
1998
Proceedings of the UAI '98: Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence, 1998
Proceedings of the Advances in Neural Information Processing Systems 11, [NIPS Conference, Denver, Colorado, USA, November 30, 1998