Items where Author is "Nieto, J"
![]() | Up a level |
Article
Nieto, JMG, Manulis, M and Sun, D (2014) Forward-Secure Hierarchical Predicate Encryption The Computer Journal, 57. pp. 510-536.
Nieto, JMG, Manulis, M, Poettering, B, Rangasamy, J and Stebila, D (2013) Publicly Verifiable Ciphertexts Journal of Computer Security, 21. pp. 749-778.
Nieto, JMG, Manulis, M and Sun, D (2012) Forward-Secure Hierarchical Predicate Encryption. IACR Cryptology ePrint Archive, 2012. p. 402.
Nieto, JMG, Manulis, M and Sun, D (2012) Fully Private Revocable Predicate Encryption. IACR Cryptology ePrint Archive, 2012. p. 403.
Nieto, JMG, Manulis, M, Poettering, B, Rangasamy, J and Stebila, D (2012) Publicly Verifiable Ciphertexts. IACR Cryptology ePrint Archive, 2012. p. 357.
Gorantla, MC, Boyd, C, Nieto, JMG and Manulis, M (2011) Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols ACM Transactions on Information and Systems Security (TISSEC), 14 (4), 28.
Gorantla, MC, Boyd, C, Nieto, JMG and Manulis, M (2009) Generic One Round Group Key Exchange in the Standard Model. IACR Cryptology ePrint Archive, 2009. p. 514.
Conference or Workshop Item
Radke, K, Boyd, C, Nieto, JG, Manulis, M and Stebila, D (2014) Formalising Human Recognition: A Fundamental Building Block for Security Proofs
Nieto, JMG, Manulis, M and Sun, D (2012) Forward-Secure Hierarchical Predicate Encryption.
Nieto, JMG, Manulis, M and Sun, D (2012) Fully Private Revocable Predicate Encryption In: 17th Australasian Conference, ACISP 2012, 2012-07-09 - 2012-07-11, Wollongong, NSW, Australia.
Nieto, JMG, Manulis, M, Poettering, B, Rangasamy, J and Stebila, D (2012) Publicly Verifiable Ciphertexts In: 8th International Conference, SCN 2012, 2012-09-05 - 2012-09-07, Amalfi, Italy.
Gorantla, MC, Boyd, C, Nieto, JMG and Manulis, M (2009) Generic One Round Group Key Exchange in the Standard Model