If you made any changes in Pure these will be visible here soon.
Filter
Chapter

Search results

  • 2011

    Key Generation Using Physical Properties of Wireless Communication

    Kiayias, A. & Yener, B., 2011, Encyclopedia of Cryptography and Security. 2nd ed. Springer US, p. 682-683 2 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2010

    Electronic Voting

    Kiayias, A., 2010, Handbook of Financial Cryptography and Security.. Chapman and Hall/CRC, p. 59-81 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Encryption for Digital Content

    Kiayias, A. & Pehlivanoglu, S., 2010, Encryption for Digital Content Volume 52 of the series Advances in Information Security pp 151-169. Boston, MA: Springer US, p. 151-169 19 p. (Advances in Information Security; vol. 52).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Fingerprinting Codes

    Kiayias, A. & Pehlivanoglu, S., 2010, Encryption for Digital Content. Boston, MA: Springer US, p. 1-33 33 p. (Advances in Information Security; vol. 52).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • The Vector-Ballot Approach for Online Voting Procedures

    Kiayias, A. & Yung, M., 2010, Towards Trustworthy Elections: New Directions in Electronic Voting. Chaum, D., Jakobsson, M., Rivest, R. L., Ryan, P. Y. A., Benaloh, J., Kutylowski, M. & Adida, B. (eds.). Berlin, Heidelberg: Springer Berlin Heidelberg, p. 155-174 20 p. (Lecture Notes in Computer Science; vol. 6000).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2003

    Robust verifiable non-interactive zero-sharing

    Kiayias, A. & Yung, M., 2003, Secure Electronic Voting: Part III. Gritzalis, D. A. (ed.). Boston, MA: Springer US, p. 139-151 13 p. (Advances in Information Security; vol. 7).

    Research output: Chapter in Book/Report/Conference proceedingChapter