Search alternatives:
function function » function functional, functions functional, function dysfunction
https function » its function, sites function, ups function
function https » functions https, fiction https
protocol » protocols
1
Table of Contents: ...Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation...
View full text
Electronic eBook
2
Table of Contents: ... Adversaries -- Covert Adversaries -- Specific Constructions -- Sigma Protocols and Efficient Zero-Knowledge1...
View full text
Electronic eBook
3
Table of Contents: ...Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC) -- Internet...
View full text
Electronic eBook
4
...A secure method of identification is crucial to avoid computer deception dynamics. This could...
View full text
Article
5
Table of Contents: ... for Internet Security Protocols -- Scalable Key Distribution Schemes -- Scalable Extensions of Non-scalable...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... Scheme and Its Secure Version -- Application of Hash Functions -- Leaky Random Oracle (Extended Abstract...
View full text
Electronic eBook
7
Published 2013
Table of Contents: ...On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ...-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis...
View full text
Electronic eBook
9
Published 2007
Table of Contents: ... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... -- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures -- Protocol -- Verifiable...
View full text
Electronic eBook
11
Published 2007
Table of Contents: ... Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ... Memory Authentication -- Database and System Security -- An Efficient PIR Construction Using Trusted...
View full text
Electronic eBook
13
Published 2006
Table of Contents: ... Exchange Protocol for Secure Credential Services -- A Non-malleable Group Key Exchange Protocol Robust...
View full text
Electronic eBook
14
Published 2008
Table of Contents: ... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ...Cryptosystems -- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings -- Hybrid Damgård...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ... Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... -- Group Message Authentication -- Cryptographic Protocols II -- Fast Secure Computation of Set...
View full text
Electronic eBook
19
Published 2006
Table of Contents: ... Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions -- Attribute-Based Authentication...
View full text
Electronic eBook
20
Published 2006
Table of Contents: ...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...
View full text
Electronic eBook