Follow
Essam Ghadafi
Essam Ghadafi
Senior Lecturer, Newcastle University
Verified email at ncl.ac.uk
Title
Cited by
Cited by
Year
Short accountable ring signatures based on DDH
J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth, C Petit
European Symposium on Research in Computer Security, 243-265, 2015
1482015
Foundations of Fully Dynamic Group Signatures
J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth
ACNS 2016, 2016
1302016
Anonymous attestation with user-controlled linkability
D Bernhard, G Fuchsbauer, E Ghadafi, NP Smart, B Warinschi
International Journal of Information Security 12, 219-249, 2013
982013
Linear-time zero-knowledge proofs for arithmetic circuit satisfiability
J Bootle, A Cerulli, E Ghadafi, J Groth, M Hajiabadi, SK Jakobsen
International Conference on the Theory and Application of Cryptology and …, 2017
932017
Groth–sahai proofs revisited
E Ghadafi, NP Smart, B Warinschi
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
852010
Decentralized traceable attribute-based signatures
A El Kaafarani, E Ghadafi, D Khader
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
842014
Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions
E Ghadafi
Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015
472015
Efficient distributed tag-based encryption and its application to group signatures with efficient distributed traceability
E Ghadafi
International Conference on Cryptology and Information Security in Latin …, 2014
402014
Efficient signatures of knowledge and DAA in the standard model
D Bernhard, G Fuchsbauer, E Ghadafi
Applied Cryptography and Network Security: 11th International Conference …, 2013
362013
Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey
A McCarthy, E Ghadafi, P Andriotis, P Legg
Journal of Cybersecurity and Privacy 2 (1), 154-190, 2022
312022
Short structure-preserving signatures
E Ghadafi
Cryptographers’ Track at the RSA Conference, 305-321, 2016
272016
Efficient Round-Optimal Blind Signatures in the Standard Model
E Ghadafi
International Conference on Financial Cryptography and Data Security, 2017
232017
Towards a classification of non-interactive computational assumptions in cyclic groups
E Ghadafi, J Groth
International Conference on the Theory and Application of Cryptology and …, 2017
212017
Attribute-based signatures with user-controlled linkability
A El Kaafarani, L Chen, E Ghadafi, J Davenport
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
212014
Formalizing group blind signatures and practical constructions without random oracles
E Ghadafi
Information Security and Privacy: 18th Australasian Conference, ACISP 2013 …, 2013
202013
Foundations of fully dynamic group signatures
J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth
Journal of Cryptology 33, 1822-1870, 2020
192020
Sub-linear blind ring signatures without random oracles
EM Ghadafi
IMA International Conference on Cryptography and Coding, 304-323, 2013
192013
Efficient two-move blind signatures in the common reference string model
E Ghadafi, NP Smart
International Conference on Information Security, 274-289, 2012
162012
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification
A McCarthy, E Ghadafi, P Andriotis, P Legg
Journal of Information Security and Applications 72, 103398, 2023
132023
Feature vulnerability and robustness assessment against adversarial machine learning attacks
A McCarthy, P Andriotis, E Ghadafi, P Legg
2021 International Conference on Cyber Situational Awareness, Data Analytics …, 2021
132021
The system can't perform the operation now. Try again later.
Articles 1–20