Michael Steiner
Michael Steiner
Research Scientist, Intel Labs
Potvrđena adresa e-pošte na
Diffie-Hellman key distribution extended to group communication
M Steiner, G Tsudik, M Waidner
Proceedings of the 3rd ACM Conference on Computer and Communications …, 1996
Highly-scalable searchable symmetric encryption with support for boolean queries
D Cash, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
Key agreement in dynamic peer groups
M Steiner, G Tsudik, M Waidner
IEEE Transactions on Parallel and Distributed Systems 11 (8), 769-780, 2000
Dynamic searchable encryption in very-large databases: Data structures and implementation
D Cash, J Jaeger, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Cryptology ePrint Archive, 2014
CLIQUES: A new approach to group key agreement
M Steiner, G Tsudik, M Waidner
Proceedings. 18th International Conference on Distributed Computing Systems …, 1998
New multiparty authentication services and key agreement protocols
G Ateniese, M Steiner, G Tsudik
IEEE journal on selected areas in communications 18 (4), 628-639, 2000
Refinement and extension of encrypted key exchange
M Steiner, G Tsudik, M Waidner
ACM SIGOPS Operating Systems Review 29 (3), 22-30, 1995
iKP-A Family of Secure Electronic Payment Protocols.
M Bellare, A Herzberg, M Steiner, G Tsudik, M Waidner, RC Hauser, ...
USENIX Workshop on Electronic Commerce, 1995
Authenticated group key agreement and friends
G Ateniese, M Steiner, G Tsudik
Proceedings of the 5th ACM Conference on Computer and Communications …, 1998
Design, implementation, and deployment of the iKP secure electronic payment system
M Bellare, JA Garay, R Hauser, A Herzberg, H Krawczyk, M Steiner, ...
IEEE Journal on selected areas in communications 18 (4), 611-627, 2000
Outsourced symmetric private information retrieval
S Jarecki, C Jutla, H Krawczyk, M Rosu, M Steiner
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Rich queries on encrypted data: Beyond exact matches
S Faber, S Jarecki, H Krawczyk, Q Nguyen, M Rosu, M Steiner
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
Micro-payments based on iKP
R Hauser, M Steiner, M Waidner
IBM TJ Watson Research Center, 1996
Three-party encrypted key exchange without server public-keys
CL Lin, HM Sun, M Steiner, T Hwang
IEEE Communications letters 5 (12), 497-499, 2001
Piggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party
C Binding, SG Hild, LJ O'connor, SK Singhal, VJ Shoup, M Steiner
US Patent 6,775,772, 2004
Smash: secure component model for cross-domain mashups on unmodified browsers
F De Keukelaere, S Bhola, M Steiner, S Chari, S Yoshihama
Proceedings of the 17th international conference on World Wide Web, 535-544, 2008
{VRASED}: A verified {Hardware/Software}{Co-Design} for remote attestation
IDO Nunes, K Eldefrawy, N Rattanavipanon, M Steiner, G Tsudik
28th USENIX Security Symposium (USENIX Security 19), 1429-1446, 2019
Designing a generic payment service
JLA Peiro, N Asokan, M Steiner, M Waidner
IBM Systems Journal 37 (1), 72-88, 1998
Intrusion detection system
S Chari, PC Cheng, J Rao, P Rohatgi, M Steiner
US Patent App. 11/037,695, 2006
Integrating remote attestation with transport layer security
T Knauth, M Steiner, S Chakrabarti, L Lei, C Xing, M Vij
arXiv preprint arXiv:1801.05863, 2018
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20