Aysajan Abidin
Aysajan Abidin
imec-COSIC KU Leuven
Email verificata su kuleuven.be - Home page
Titolo
Citata da
Citata da
Anno
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salath, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
92*2020
A Local Electricity Trading Market: Security Analysis
MA Mustafa, S Cleemput, A Abidin
IEEE PES Innovative Smart Grid Technologies (ISGT-Europe) Conference, 2016
352016
On the leakage of information in biometric authentication
E Pagnin, C Dimitrakakis, A Abidin, A Mitrokotsa
International Conference on Cryptology in India, 265-280, 2014
242014
A secure and privacy-preserving protocol for smart metering operational data collection
MA Mustafa, S Cleemput, A Aly, A Abidin
IEEE Transactions on Smart Grid 10 (6), 6481-6490, 2019
212019
Secure and privacy-friendly local electricity trading and billing in smart grid
A Abidin, A Aly, S Cleemput, MA Mustafa
arXiv preprint arXiv:1801.08354, 2018
202018
An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market
A Abidin, A Aly, S Cleemput, MA Mustafa
182016
Authentication in quantum key distribution: Security proof and universal hash functions
A Abidin
Linkping University Electronic Press, 2013
17*2013
Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-lwe
A Abidin, A Mitrokotsa
2014 IEEE International Workshop on Information Forensics and Security (WIFS…, 2014
142014
Security of a privacy-preserving biometric authentication protocol revisited
A Abidin, K Matsuura, A Mitrokotsa
International Conference on Cryptology and Network Security, 290-304, 2014
12*2014
On privacy-preserving biometric authentication
A Abidin
International Conference on Information Security and Cryptology, 169-186, 2016
112016
Attacks on quantum key distribution protocols that employ non-ITS authentication
C Pacher, A Abidin, T Lornser, M Peev, R Ursin, A Zeilinger, J Larsson
Quantum Information Processing 15 (1), 327-362, 2016
102016
Direct proof of security of Wegman–Carter authentication with partially known key
A Abidin, J Larsson
Quantum information processing 13 (10), 2155-2170, 2014
102014
Security of authentication with a fixed key in quantum key distribution
A Abidin, J Larsson
eprint arXiv:1109.5168, 2011
92011
New universal hash functions
A Abidin, J Larsson
Western European Workshop on Research in Cryptology, 99-108, 2011
92011
Attacks on privacy-preserving biometric authentication
A Abidin, E Pagnin, A Mitrokotsa
Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014…, 2014
72014
An MPC-based Protocol for Secure and Privacy-Preserving Smart Metering
MA Mustafa, S Cleemput, A Aly, A Abidin
IEEE PES Innovative Smart Grid Technologies (ISGT Europe 2017), 2017
62017
Response to" Vulnerability of'A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography'"
M Peev, C Pacher, T Lornser, M Nlle, A Poppe, O Maurhart, M Suda, ...
International Journal of Quantum Information 7 (07), 1401-1407, 2009
62009
Vulnerability of "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in Quantum Cryptography"
A Abidin, JANKE LARSSON
International Journal of Quantum Information 7 (05), 1047-1052, 2009
62009
Efficient unconditionally secure signatures using universal hashing
R Amiri, A Abidin, P Wallden, E Andersson
International Conference on Applied Cryptography and Network Security, 143-162, 2018
52018
Efficient Verifiable Computation of XOR for Biometric Authentication
A Abidin, A Aly, EA Ra, A Mitrokotsa
International Conference on Cryptology and Network Security, 284-298, 2016
52016
Il sistema al momento non pu eseguire l'operazione. Riprova pi tardi.
Articoli 1–20