Eu-Jin Goh
Eu-Jin Goh
Afiliación desconocida
Dirección de correo verificada de cs.stanford.edu
Título
Citado por
Citado por
Año
Evaluating 2-DNF formulas on ciphertexts
D Boneh, EJ Goh, K Nissim
Theory of cryptography conference, 325-341, 2005
18682005
Hierarchical identity based encryption with constant size ciphertext
D Boneh, X Boyen, EJ Goh
Annual International Conference on the Theory and Applications of …, 2005
15872005
Secure indexes.
EJ Goh
IACR Cryptol. ePrint Arch. 2003, 216, 2003
15812003
On the effectiveness of address-space randomization
H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh
Proceedings of the 11th ACM conference on Computer and communications …, 2004
11662004
SiRiUS: Securing Remote Untrusted Storage.
EJ Goh, H Shacham, N Modadugu, D Boneh
NDSS 3, 131-145, 2003
7612003
Efficient selective identity-based encryption without random oracles
D Boneh, X Boyen
Journal of Cryptology 24 (4), 659-693, 2011
1612011
A signature scheme as secure as the Diffie-Hellman problem
EJ Goh, S Jarecki
International Conference on the Theory and Applications of Cryptographic …, 2003
1572003
Efficient signature schemes with tight reductions to the Diffie-Hellman problems
EJ Goh, S Jarecki, J Katz, N Wang
Journal of Cryptology 20 (4), 493-514, 2007
972007
Secure function evaluation with ordered binary decision diagrams
L Kruger, S Jha, EJ Goh, D Boneh
Proceedings of the 13th ACM conference on Computer and communications …, 2006
782006
Method and apparatus for transparent encryption
D Boneh, R Chawla, A Frindell, EJ Goh, N Modadugu, P Tsirigotis
US Patent 7,757,278, 2010
732010
Secure indexes, Cryptography ePrint archive
EJ Goh
http://eprint. iacr. org/2006/216/, 2003
432003
Encryption schemes from bilinear maps
EJ Goh
Stanford University, 2007
372007
The design and implementation of protocol-based hidden key recovery
EJ Goh, D Boneh, B Pinkas, P Golle
International Conference on Information Security, 165-179, 2003
322003
Covert channels in privacy-preserving identification systems
DV Bailey, D Boneh, EJ Goh, A Juels
Proceedings of the 14th ACM conference on Computer and communications …, 2007
222007
Delegation system for decryption rights
T Matsuo, D Boneh, EJ Goh
US Patent App. 11/894,448, 2008
192008
Event driven private counters
EJ Goh, P Golle
International Conference on Financial Cryptography and Data Security, 313-327, 2005
112005
Secure indexes
E jin Goh
In submission, 2004
92004
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005
D Boneh, X Boyen, EJ Goh
Proceedings, chapter Hierarchical Identity Based Encryption with Constant …, 0
4
How to Search on Encrypted data
EJ Goh
slides available at http://crypto. stanford. edu/~ eujin/papers/secureindex …, 2003
32003
Searching on Encrypted Data
EJ Goh
2003
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20