BibTeX records: Michael Clear

download as .bib file

@inproceedings{DBLP:conf/innovations/AgrawalCFGOT20,
  author    = {Shweta Agrawal and
               Michael Clear and
               Ophir Frieder and
               Sanjam Garg and
               Adam O'Neill and
               Justin Thaler},
  editor    = {Thomas Vidick},
  title     = {Ad Hoc Multi-Input Functional Encryption},
  booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS}
               2020, January 12-14, 2020, Seattle, Washington, {USA}},
  series    = {LIPIcs},
  volume    = {151},
  pages     = {40:1--40:41},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year      = {2020},
  url       = {https://doi.org/10.4230/LIPIcs.ITCS.2020.40},
  doi       = {10.4230/LIPIcs.ITCS.2020.40},
  timestamp = {Mon, 06 Jan 2020 16:50:09 +0100},
  biburl    = {https://dblp.org/rec/conf/innovations/AgrawalCFGOT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ClearM19,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  editor    = {Dongdai Lin and
               Kazue Sako},
  title     = {Additively Homomorphic {IBE} from Higher Residuosity},
  booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
               on Practice and Theory of Public-Key Cryptography, Beijing, China,
               April 14-17, 2019, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11442},
  pages     = {496--515},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-17253-4\_17},
  doi       = {10.1007/978-3-030-17253-4\_17},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/ClearM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM19,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Additively Homomorphic {IBE} from Higher Residuosity},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {62},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/062},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/ClearM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalCFGOT19,
  author    = {Shweta Agrawal and
               Michael Clear and
               Ophir Frieder and
               Sanjam Garg and
               Adam O'Neill and
               Justin Thaler},
  title     = {Ad Hoc Multi-Input Functional Encryption},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {356},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/356},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AgrawalCFGOT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/ClearG17,
  author    = {Michael Clear and
               Ciar{\'{a}}n Mc Goldrick},
  title     = {Attribute-based fully homomorphic encryption with a bounded number
               of inputs},
  journal   = {{IJACT}},
  volume    = {3},
  number    = {4},
  pages     = {363--376},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJACT.2017.10010329},
  doi       = {10.1504/IJACT.2017.10010329},
  timestamp = {Thu, 01 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijact/ClearG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RowanCGHG17,
  author    = {Sean Rowan and
               Michael Clear and
               Mario Gerla and
               Meriel Huggard and
               Ciar{\'{a}}n Mc Goldrick},
  title     = {Securing Vehicle to Vehicle Communications using Blockchain through
               Visible Light and Acoustic Side-Channels},
  journal   = {CoRR},
  volume    = {abs/1704.02553},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.02553},
  archivePrefix = {arXiv},
  eprint    = {1704.02553},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/RowanCGHG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM17,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Attribute-Based Group Homomorphic Encryption and Additively Homomorphic
               {IBE}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {752},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/752},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/ClearM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ClearM16,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  editor    = {David Pointcheval and
               Abderrahmane Nitaj and
               Tajjeeddine Rachidi},
  title     = {Attribute-Based Fully Homomorphic Encryption with a Bounded Number
               of Inputs},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
               on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9646},
  pages     = {307--324},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-31517-1\_16},
  doi       = {10.1007/978-3-319-31517-1\_16},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/africacrypt/ClearM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM16,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Attribute-Based Fully Homomorphic Encryption with a Bounded Number
               of Inputs},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {99},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/099},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/ClearM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PatsakisLCBS15,
  author    = {Constantinos Patsakis and
               Paul Laird and
               Michael Clear and
               M{\'{e}}lanie Bouroche and
               Agusti Solanas},
  title     = {Interoperable Privacy-Aware E-Participation within Smart Cities},
  journal   = {{IEEE} Computer},
  volume    = {48},
  number    = {1},
  pages     = {52--58},
  year      = {2015},
  url       = {https://doi.org/10.1109/MC.2015.16},
  doi       = {10.1109/MC.2015.16},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/computer/PatsakisLCBS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ClearM15,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Multi-identity and Multi-key Leveled {FHE} from Learning with Errors},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9216},
  pages     = {630--656},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48000-7\_31},
  doi       = {10.1007/978-3-662-48000-7\_31},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/ClearM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RhinowC15,
  author    = {Florian Rhinow and
               Michael Clear},
  editor    = {Mohammad S. Obaidat and
               Pascal Lorenz and
               Pierangela Samarati},
  title     = {Scargos: Towards Automatic Vulnerability Distribution},
  booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
               on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
               2015},
  pages     = {369--376},
  publisher = {SciTePress},
  year      = {2015},
  url       = {https://doi.org/10.5220/0005566203690376},
  doi       = {10.5220/0005566203690376},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/secrypt/RhinowC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ClearTM14,
  author    = {Michael Clear and
               Hitesh Tewari and
               Ciaran McGoldrick},
  editor    = {David Pointcheval and
               Damien Vergnaud},
  title     = {Anonymous {IBE} from Quadratic Residuosity with Improved Performance},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8469},
  pages     = {377--397},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-06734-6\_23},
  doi       = {10.1007/978-3-319-06734-6\_23},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/africacrypt/ClearTM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ClearM14,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  editor    = {Dimitris Gritzalis and
               Aggelos Kiayias and
               Ioannis G. Askoxylakis},
  title     = {Bootstrappable Identity-Based Fully Homomorphic Encryption},
  booktitle = {Cryptology and Network Security - 13th International Conference, {CANS}
               2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8813},
  pages     = {1--19},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-12280-9\_1},
  doi       = {10.1007/978-3-319-12280-9\_1},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/cans/ClearM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbms/PatsakisCLZB14,
  author    = {Constantinos Patsakis and
               Michael Clear and
               Paul Laird and
               Athanasios Zigomitros and
               M{\'{e}}lanie Bouroche},
  title     = {Privacy-Aware Large-Scale Virological and Epidemiological Data Monitoring},
  booktitle = {2014 {IEEE} 27th International Symposium on Computer-Based Medical
               Systems, New York, NY, USA, May 27-29, 2014},
  pages     = {78--81},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://doi.org/10.1109/CBMS.2014.89},
  doi       = {10.1109/CBMS.2014.89},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/cbms/PatsakisCLZB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PatsakisCL14,
  author    = {Constantinos Patsakis and
               Michael Clear and
               Paul Laird},
  editor    = {Dongdai Lin and
               Moti Yung and
               Jianying Zhou},
  title     = {Private Aggregation with Custom Collusion Tolerance},
  booktitle = {Information Security and Cryptology - 10th International Conference,
               Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8957},
  pages     = {72--89},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-16745-9\_5},
  doi       = {10.1007/978-3-319-16745-9\_5},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/cisc/PatsakisCL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ClearPL14,
  author    = {Michael Clear and
               Constantinos Patsakis and
               Paul Laird},
  title     = {Lightweight Self-Bootstrapping Multiparty Computations of Time-Series
               Data with Custom Collusion Tolerance},
  journal   = {CoRR},
  volume    = {abs/1402.7118},
  year      = {2014},
  url       = {http://arxiv.org/abs/1402.7118},
  archivePrefix = {arXiv},
  eprint    = {1402.7118},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/ClearPL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM14,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Bootstrappable Identity-Based Fully Homomorphic Encryption},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2014},
  pages     = {491},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/491},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/ClearM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearTM14,
  author    = {Michael Clear and
               Hitesh Tewari and
               Ciaran McGoldrick},
  title     = {Anonymous {IBE} from Quadratic Residuosity with Improved Performance},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2014},
  pages     = {778},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/778},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/ClearTM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM14a,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Multi-Identity and Multi-Key Leveled {FHE} from Learning with Errors},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2014},
  pages     = {798},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/798},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/ClearM14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ClearHT13,
  author    = {Michael Clear and
               Arthur Hughes and
               Hitesh Tewari},
  editor    = {Amr M. Youssef and
               Abderrahmane Nitaj and
               Aboul Ella Hassanien},
  title     = {Homomorphic Encryption with Access Policies: Characterization and
               New Constructions},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
               on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7918},
  pages     = {61--87},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38553-7\_4},
  doi       = {10.1007/978-3-642-38553-7\_4},
  timestamp = {Fri, 31 Jan 2020 16:14:16 +0100},
  biburl    = {https://dblp.org/rec/conf/africacrypt/ClearHT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ClearM13,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  editor    = {Pierangela Samarati},
  title     = {Policy-based Non-interactive Outsourcing of Computation using Multikey
               {FHE} and {CP-ABE}},
  booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  pages     = {444--452},
  publisher = {SciTePress},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/document/7223196/},
  timestamp = {Sun, 30 Apr 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/secrypt/ClearM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-1192,
  author    = {Michael Clear and
               Arthur Hughes and
               Hitesh Tewari},
  title     = {Homomorphic Encryption with Access Policies: Characterization and
               New Constructions},
  journal   = {CoRR},
  volume    = {abs/1302.1192},
  year      = {2013},
  url       = {http://arxiv.org/abs/1302.1192},
  archivePrefix = {arXiv},
  eprint    = {1302.1192},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1302-1192.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM13,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Policy-Based Non-interactive Outsourcing of Computation using multikey
               {FHE} and {CP-ABE}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2013},
  pages     = {875},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/875},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/ClearM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/WarrenCM12,
  author    = {Jeff Warren and
               Michael Clear and
               Ciaran McGoldrick},
  title     = {Metadata Independent Hashing for Media Identification {\&} {P2P}
               Transfer Optimisation},
  booktitle = {2012 International Conference on Cyber-Enabled Distributed Computing
               and Knowledge Discovery, CyberC 2012, Sanya, China, October 10-12,
               2012},
  pages     = {58--65},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {https://doi.org/10.1109/CyberC.2012.19},
  doi       = {10.1109/CyberC.2012.19},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/cyberc/WarrenCM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ClearREHT12,
  author    = {Michael Clear and
               Karl Reid and
               Desmond Ennis and
               Arthur Hughes and
               Hitesh Tewari},
  editor    = {Dieter Gollmann and
               Felix C. Freiling},
  title     = {Collaboration-Preserving Authenticated Encryption for Operational
               Transformation Systems},
  booktitle = {Information Security - 15th International Conference, {ISC} 2012,
               Passau, Germany, September 19-21, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7483},
  pages     = {204--223},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33383-5\_13},
  doi       = {10.1007/978-3-642-33383-5\_13},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/isw/ClearREHT12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics