1
Indholdsfortegnelse: ...Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation...
Få fuldtekst
Electronisk eBog
2
Indholdsfortegnelse: ... Adversaries -- Covert Adversaries -- Specific Constructions -- Sigma Protocols and Efficient Zero-Knowledge1...
Få fuldtekst
Electronisk eBog
3
Indholdsfortegnelse: ...Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC) -- Internet...
Få fuldtekst
Electronisk eBog
4
Indholdsfortegnelse: ... for Internet Security Protocols -- Scalable Key Distribution Schemes -- Scalable Extensions of Non-scalable...
Få fuldtekst
Electronisk eBog
5
Udgivet 2007
Indholdsfortegnelse: ... Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure...
Få fuldtekst
Electronisk eBog
6
Udgivet 2010
Indholdsfortegnelse: ... of the Art and Future Research Directions -- Hardware Intrinsic Security from Physically Unclonable Functions...
Få fuldtekst
Electronisk eBog
7
Udgivet 2008
Indholdsfortegnelse: ... for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer...
Få fuldtekst
Electronisk eBog
8
Udgivet 2010
Indholdsfortegnelse: ... -- Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme -- Session 2C...
Få fuldtekst
Electronisk eBog
9
Udgivet 2010
Indholdsfortegnelse: ... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...
Få fuldtekst
Electronisk eBog
10
Udgivet 2012
Indholdsfortegnelse: ... Authentication --  On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time...
Få fuldtekst
Electronisk eBog
11
Udgivet 2008
Indholdsfortegnelse: ... Scheme and Its Secure Version -- Application of Hash Functions -- Leaky Random Oracle (Extended Abstract...
Få fuldtekst
Electronisk eBog
12
Udgivet 2010
Indholdsfortegnelse: ...-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis...
Få fuldtekst
Electronisk eBog
13
Udgivet 2014
Indholdsfortegnelse: ... of GF-NLFSR structure with SPN round function -- Misuse-Resistant Variants of the OMD Authenticated...
Få fuldtekst
Electronisk eBog
14
Udgivet 2008
Indholdsfortegnelse: ... Memory Authentication -- Database and System Security -- An Efficient PIR Construction Using Trusted...
Få fuldtekst
Electronisk eBog
15
Udgivet 2008
Indholdsfortegnelse: ...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...
Få fuldtekst
Electronisk eBog
16
Udgivet 2006
Indholdsfortegnelse: ... Structures for Copyright Protection -- Boolean Functions and Stream Ciphers -- A Note of Perfect Nonlinear...
Få fuldtekst
Electronisk eBog
17
Udgivet 2005
Indholdsfortegnelse: ... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...
Få fuldtekst
Electronisk eBog
18
Udgivet 2007
Indholdsfortegnelse: ... Data Structures -- New Construction of Group Secret Handshakes Based on Pairings -- nPAKE?+?: A...
Få fuldtekst
Electronisk eBog
19
Udgivet 2013
Indholdsfortegnelse: ... Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining...
Få fuldtekst
Electronisk eBog
20
Udgivet 2010
Indholdsfortegnelse: ...Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure...
Få fuldtekst
Electronisk eBog