@article{DBLP:journals/ijact/ClearG17,
author = {Michael Clear and
Ciar{\'{a}}n Mc Goldrick},
title = {Attribute-based fully homomorphic encryption with a bounded number
of inputs},
journal = {{IJACT}},
volume = {3},
number = {4},
pages = {363--376},
year = {2017},
url = {https://doi.org/10.1504/IJACT.2017.10010329},
doi = {10.1504/IJACT.2017.10010329},
timestamp = {Thu, 01 Feb 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/journals/ijact/ClearG17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RowanCGHG17,
author = {Sean Rowan and
Michael Clear and
Mario Gerla and
Meriel Huggard and
Ciar{\'{a}}n Mc Goldrick},
title = {Securing Vehicle to Vehicle Communications using Blockchain through
Visible Light and Acoustic Side-Channels},
journal = {CoRR},
volume = {abs/1704.02553},
year = {2017},
url = {http://arxiv.org/abs/1704.02553},
archivePrefix = {arXiv},
eprint = {1704.02553},
timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/corr/RowanCGHG17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM17,
author = {Michael Clear and
Ciaran McGoldrick},
title = {Attribute-Based Group Homomorphic Encryption and Additively Homomorphic
{IBE}},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2017},
pages = {752},
year = {2017},
url = {http://eprint.iacr.org/2017/752},
timestamp = {Fri, 25 Aug 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/ClearM17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ClearM16,
author = {Michael Clear and
Ciaran McGoldrick},
title = {Attribute-Based Fully Homomorphic Encryption with a Bounded Number
of Inputs},
booktitle = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
pages = {307--324},
year = {2016},
crossref = {DBLP:conf/africacrypt/2016},
url = {https://doi.org/10.1007/978-3-319-31517-1_16},
doi = {10.1007/978-3-319-31517-1_16},
timestamp = {Mon, 22 May 2017 17:11:10 +0200},
biburl = {https://dblp.org/rec/bib/conf/africacrypt/ClearM16},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM16,
author = {Michael Clear and
Ciaran McGoldrick},
title = {Attribute-Based Fully Homomorphic Encryption with a Bounded Number
of Inputs},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2016},
pages = {99},
year = {2016},
url = {http://eprint.iacr.org/2016/099},
timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/ClearM16},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PatsakisLCBS15,
author = {Constantinos Patsakis and
Paul Laird and
Michael Clear and
M{\'{e}}lanie Bouroche and
Agusti Solanas},
title = {Interoperable Privacy-Aware E-Participation within Smart Cities},
journal = {{IEEE} Computer},
volume = {48},
number = {1},
pages = {52--58},
year = {2015},
url = {https://doi.org/10.1109/MC.2015.16},
doi = {10.1109/MC.2015.16},
timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/computer/PatsakisLCBS15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ClearM15,
author = {Michael Clear and
Ciaran McGoldrick},
title = {Multi-identity and Multi-key Leveled {FHE} from Learning with Errors},
booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
pages = {630--656},
year = {2015},
crossref = {DBLP:conf/crypto/2015-2},
url = {https://doi.org/10.1007/978-3-662-48000-7_31},
doi = {10.1007/978-3-662-48000-7_31},
timestamp = {Fri, 26 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/crypto/ClearM15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RhinowC15,
author = {Florian Rhinow and
Michael Clear},
title = {Scargos: Towards Automatic Vulnerability Distribution},
booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
2015.},
pages = {369--376},
year = {2015},
crossref = {DBLP:conf/secrypt/2015},
url = {https://doi.org/10.5220/0005566203690376},
doi = {10.5220/0005566203690376},
timestamp = {Sun, 21 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/secrypt/RhinowC15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ClearTM14,
author = {Michael Clear and
Hitesh Tewari and
Ciaran McGoldrick},
title = {Anonymous {IBE} from Quadratic Residuosity with Improved Performance},
booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
pages = {377--397},
year = {2014},
crossref = {DBLP:conf/africacrypt/2014},
url = {https://doi.org/10.1007/978-3-319-06734-6_23},
doi = {10.1007/978-3-319-06734-6_23},
timestamp = {Mon, 29 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/africacrypt/ClearTM14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ClearM14,
author = {Michael Clear and
Ciaran McGoldrick},
title = {Bootstrappable Identity-Based Fully Homomorphic Encryption},
booktitle = {Cryptology and Network Security - 13th International Conference, {CANS}
2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
pages = {1--19},
year = {2014},
crossref = {DBLP:conf/cans/2014},
url = {https://doi.org/10.1007/978-3-319-12280-9_1},
doi = {10.1007/978-3-319-12280-9_1},
timestamp = {Wed, 24 May 2017 08:27:40 +0200},
biburl = {https://dblp.org/rec/bib/conf/cans/ClearM14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbms/PatsakisCLZB14,
author = {Constantinos Patsakis and
Michael Clear and
Paul Laird and
Athanasios Zigomitros and
M{\'{e}}lanie Bouroche},
title = {Privacy-Aware Large-Scale Virological and Epidemiological Data Monitoring},
booktitle = {2014 {IEEE} 27th International Symposium on Computer-Based Medical
Systems, New York, NY, USA, May 27-29, 2014},
pages = {78--81},
year = {2014},
crossref = {DBLP:conf/cbms/2014},
url = {https://doi.org/10.1109/CBMS.2014.89},
doi = {10.1109/CBMS.2014.89},
timestamp = {Thu, 01 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/cbms/PatsakisCLZB14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PatsakisCL14,
author = {Constantinos Patsakis and
Michael Clear and
Paul Laird},
title = {Private Aggregation with Custom Collusion Tolerance},
booktitle = {Information Security and Cryptology - 10th International Conference,
Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
Papers},
pages = {72--89},
year = {2014},
crossref = {DBLP:conf/cisc/2014},
url = {https://doi.org/10.1007/978-3-319-16745-9_5},
doi = {10.1007/978-3-319-16745-9_5},
timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
biburl = {https://dblp.org/rec/bib/conf/cisc/PatsakisCL14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ClearPL14,
author = {Michael Clear and
Constantinos Patsakis and
Paul Laird},
title = {Lightweight Self-Bootstrapping Multiparty Computations of Time-Series
Data with Custom Collusion Tolerance},
journal = {CoRR},
volume = {abs/1402.7118},
year = {2014},
url = {http://arxiv.org/abs/1402.7118},
archivePrefix = {arXiv},
eprint = {1402.7118},
timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/corr/ClearPL14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM14,
author = {Michael Clear and
Ciaran McGoldrick},
title = {Bootstrappable Identity-Based Fully Homomorphic Encryption},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2014},
pages = {491},
year = {2014},
url = {http://eprint.iacr.org/2014/491},
timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/ClearM14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearTM14,
author = {Michael Clear and
Hitesh Tewari and
Ciaran McGoldrick},
title = {Anonymous {IBE} from Quadratic Residuosity with Improved Performance},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2014},
pages = {778},
year = {2014},
url = {http://eprint.iacr.org/2014/778},
timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/ClearTM14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM14a,
author = {Michael Clear and
Ciaran McGoldrick},
title = {Multi-Identity and Multi-Key Leveled {FHE} from Learning with Errors},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2014},
pages = {798},
year = {2014},
url = {http://eprint.iacr.org/2014/798},
timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/ClearM14a},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ClearHT13,
author = {Michael Clear and
Arthur Hughes and
Hitesh Tewari},
title = {Homomorphic Encryption with Access Policies: Characterization and
New Constructions},
booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
pages = {61--87},
year = {2013},
crossref = {DBLP:conf/africacrypt/2013},
url = {https://doi.org/10.1007/978-3-642-38553-7_4},
doi = {10.1007/978-3-642-38553-7_4},
timestamp = {Mon, 22 May 2017 17:11:10 +0200},
biburl = {https://dblp.org/rec/bib/conf/africacrypt/ClearHT13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ClearM13,
author = {Michael Clear and
Ciaran McGoldrick},
title = {Policy-based Non-interactive Outsourcing of Computation using Multikey
{FHE} and {CP-ABE}},
booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
July, 2013},
pages = {444--452},
year = {2013},
crossref = {DBLP:conf/secrypt/2013},
url = {http://ieeexplore.ieee.org/document/7223196/},
timestamp = {Sun, 30 Apr 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/secrypt/ClearM13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-1192,
author = {Michael Clear and
Arthur Hughes and
Hitesh Tewari},
title = {Homomorphic Encryption with Access Policies: Characterization and
New Constructions},
journal = {CoRR},
volume = {abs/1302.1192},
year = {2013},
url = {http://arxiv.org/abs/1302.1192},
archivePrefix = {arXiv},
eprint = {1302.1192},
timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/corr/abs-1302-1192},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM13,
author = {Michael Clear and
Ciaran McGoldrick},
title = {Policy-Based Non-interactive Outsourcing of Computation using multikey
{FHE} and {CP-ABE}},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2013},
pages = {875},
year = {2013},
url = {http://eprint.iacr.org/2013/875},
timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/ClearM13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/WarrenCM12,
author = {Jeff Warren and
Michael Clear and
Ciaran McGoldrick},
title = {Metadata Independent Hashing for Media Identification {\&} {P2P}
Transfer Optimisation},
booktitle = {2012 International Conference on Cyber-Enabled Distributed Computing
and Knowledge Discovery, CyberC 2012, Sanya, China, October 10-12,
2012},
pages = {58--65},
year = {2012},
crossref = {DBLP:conf/cyberc/2012},
url = {https://doi.org/10.1109/CyberC.2012.19},
doi = {10.1109/CyberC.2012.19},
timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/cyberc/WarrenCM12},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ClearREHT12,
author = {Michael Clear and
Karl Reid and
Desmond Ennis and
Arthur Hughes and
Hitesh Tewari},
title = {Collaboration-Preserving Authenticated Encryption for Operational
Transformation Systems},
booktitle = {Information Security - 15th International Conference, {ISC} 2012,
Passau, Germany, September 19-21, 2012. Proceedings},
pages = {204--223},
year = {2012},
crossref = {DBLP:conf/isw/2012},
url = {https://doi.org/10.1007/978-3-642-33383-5_13},
doi = {10.1007/978-3-642-33383-5_13},
timestamp = {Sun, 21 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/isw/ClearREHT12},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2016,
editor = {David Pointcheval and
Abderrahmane Nitaj and
Tajjeeddine Rachidi},
title = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9646},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-31517-1},
doi = {10.1007/978-3-319-31517-1},
isbn = {978-3-319-31516-4},
timestamp = {Mon, 22 May 2017 17:11:10 +0200},
biburl = {https://dblp.org/rec/bib/conf/africacrypt/2016},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-2,
editor = {Rosario Gennaro and
Matthew Robshaw},
title = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {9216},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-662-48000-7},
doi = {10.1007/978-3-662-48000-7},
isbn = {978-3-662-47999-5},
timestamp = {Fri, 26 May 2017 00:50:20 +0200},
biburl = {https://dblp.org/rec/bib/conf/crypto/2015-2},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2015,
editor = {Mohammad S. Obaidat and
Pascal Lorenz and
Pierangela Samarati},
title = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
2015},
publisher = {SciTePress},
year = {2015},
isbn = {978-989-758-117-5},
timestamp = {Thu, 06 Aug 2015 12:56:43 +0200},
biburl = {https://dblp.org/rec/bib/conf/secrypt/2015},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2014,
editor = {David Pointcheval and
Damien Vergnaud},
title = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8469},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-06734-6},
doi = {10.1007/978-3-319-06734-6},
isbn = {978-3-319-06733-9},
timestamp = {Mon, 22 May 2017 17:11:10 +0200},
biburl = {https://dblp.org/rec/bib/conf/africacrypt/2014},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2014,
editor = {Dimitris Gritzalis and
Aggelos Kiayias and
Ioannis G. Askoxylakis},
title = {Cryptology and Network Security - 13th International Conference, {CANS}
2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8813},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-12280-9},
doi = {10.1007/978-3-319-12280-9},
isbn = {978-3-319-12279-3},
timestamp = {Wed, 24 May 2017 08:27:40 +0200},
biburl = {https://dblp.org/rec/bib/conf/cans/2014},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cbms/2014,
title = {2014 {IEEE} 27th International Symposium on Computer-Based Medical
Systems, New York, NY, USA, May 27-29, 2014},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6881324},
isbn = {978-1-4799-4435-4},
timestamp = {Fri, 27 Mar 2015 19:02:21 +0100},
biburl = {https://dblp.org/rec/bib/conf/cbms/2014},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2014,
editor = {Dongdai Lin and
Moti Yung and
Jianying Zhou},
title = {Information Security and Cryptology - 10th International Conference,
Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
Papers},
series = {Lecture Notes in Computer Science},
volume = {8957},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-16745-9},
doi = {10.1007/978-3-319-16745-9},
isbn = {978-3-319-16744-2},
timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
biburl = {https://dblp.org/rec/bib/conf/cisc/2014},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2013,
editor = {Amr Youssef and
Abderrahmane Nitaj and
Aboul Ella Hassanien},
title = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7918},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-38553-7},
doi = {10.1007/978-3-642-38553-7},
isbn = {978-3-642-38552-0},
timestamp = {Mon, 22 May 2017 17:11:10 +0200},
biburl = {https://dblp.org/rec/bib/conf/africacrypt/2013},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2013,
editor = {Pierangela Samarati},
title = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
July, 2013},
publisher = {SciTePress},
year = {2013},
isbn = {978-989-8565-73-0},
timestamp = {Tue, 05 Nov 2013 12:35:25 +0100},
biburl = {https://dblp.org/rec/bib/conf/secrypt/2013},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cyberc/2012,
title = {2012 International Conference on Cyber-Enabled Distributed Computing
and Knowledge Discovery, CyberC 2012, Sanya, China, October 10-12,
2012},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6383189},
isbn = {978-1-4673-2624-7},
timestamp = {Thu, 23 Oct 2014 11:41:14 +0200},
biburl = {https://dblp.org/rec/bib/conf/cyberc/2012},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2012,
editor = {Dieter Gollmann and
Felix C. Freiling},
title = {Information Security - 15th International Conference, {ISC} 2012,
Passau, Germany, September 19-21, 2012. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7483},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-33383-5},
doi = {10.1007/978-3-642-33383-5},
isbn = {978-3-642-33382-8},
timestamp = {Sun, 21 May 2017 00:20:08 +0200},
biburl = {https://dblp.org/rec/bib/conf/isw/2012},
bibsource = {dblp computer science bibliography, https://dblp.org}
}