Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
function function » function functional, functions functional, function dysfunction
https function » its function, sites function, ups function
function https » functions https, fiction https
protocol » protocols
function function » function functional, functions functional, function dysfunction
https function » its function, sites function, ups function
function https » functions https, fiction https
protocol » protocols
1
Table of Contents:
“...Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation...”
View full text
View full text
Electronic
eBook
2
Table of Contents:
“... Adversaries -- Covert Adversaries -- Specific Constructions -- Sigma Protocols and Efficient Zero-Knowledge1...”
View full text
View full text
Electronic
eBook
3
Table of Contents:
“...Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC) -- Internet...”
View full text
View full text
Electronic
eBook
4
“...A secure method of identification is crucial to avoid computer deception dynamics. This could...”
View full text
View full text
Article
5
Table of Contents:
“... for Internet Security Protocols -- Scalable Key Distribution Schemes -- Scalable Extensions of Non-scalable...”
View full text
View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... Scheme and Its Secure Version -- Application of Hash Functions -- Leaky Random Oracle (Extended Abstract...”View full text
Electronic
eBook
7
Published 2013
Table of Contents:
“...On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“...-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis...”View full text
Electronic
eBook
9
Published 2007
Table of Contents:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“... -- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures -- Protocol -- Verifiable...”View full text
Electronic
eBook
11
Published 2007
Table of Contents:
“... Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure...”View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“... Memory Authentication -- Database and System Security -- An Efficient PIR Construction Using Trusted...”View full text
Electronic
eBook
13
Published 2006
Table of Contents:
“... Exchange Protocol for Secure Credential Services -- A Non-malleable Group Key Exchange Protocol Robust...”View full text
Electronic
eBook
14
Published 2008
Table of Contents:
“... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“...Cryptosystems -- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings -- Hybrid Damgård...”View full text
Electronic
eBook
16
Published 2005
Table of Contents:
“... Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... -- Group Message Authentication -- Cryptographic Protocols II -- Fast Secure Computation of Set...”View full text
Electronic
eBook
19
Published 2006
Table of Contents:
“... Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions -- Attribute-Based Authentication...”View full text
Electronic
eBook
20
Published 2006
Table of Contents:
“...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...”View full text
Electronic
eBook



