Foreslåede emner i din søgning.
Foreslåede emner i din søgning.
Søg alternativer:
function structures » functions structures, function structure, functional structures
protocols secure » protocols security, protocol security
https function » its function, sites function, ups function
secure https » security https, leisure https, securities https
function structures » functions structures, function structure, functional structures
protocols secure » protocols security, protocol security
https function » its function, sites function, ups function
secure https » security https, leisure https, securities https
1
Indholdsfortegnelse:
“...Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation...”
Få fuldtekst
Få fuldtekst
Electronisk
eBog
2
Indholdsfortegnelse:
“... Adversaries -- Covert Adversaries -- Specific Constructions -- Sigma Protocols and Efficient Zero-Knowledge1...”
Få fuldtekst
Få fuldtekst
Electronisk
eBog
3
Indholdsfortegnelse:
“...Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC) -- Internet...”
Få fuldtekst
Få fuldtekst
Electronisk
eBog
4
Indholdsfortegnelse:
“... for Internet Security Protocols -- Scalable Key Distribution Schemes -- Scalable Extensions of Non-scalable...”
Få fuldtekst
Få fuldtekst
Electronisk
eBog
5
Udgivet 2007
Indholdsfortegnelse:
“... Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure...”Få fuldtekst
Electronisk
eBog
6
Udgivet 2010
Indholdsfortegnelse:
“... of the Art and Future Research Directions -- Hardware Intrinsic Security from Physically Unclonable Functions...”Få fuldtekst
Electronisk
eBog
7
Udgivet 2008
Indholdsfortegnelse:
“... for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer...”Få fuldtekst
Electronisk
eBog
8
Udgivet 2010
Indholdsfortegnelse:
“... -- Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme -- Session 2C...”Få fuldtekst
Electronisk
eBog
9
Udgivet 2010
Indholdsfortegnelse:
“... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...”Få fuldtekst
Electronisk
eBog
10
Udgivet 2012
Indholdsfortegnelse:
“... Authentication -- On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time...”Få fuldtekst
Electronisk
eBog
11
Udgivet 2008
Indholdsfortegnelse:
“... Scheme and Its Secure Version -- Application of Hash Functions -- Leaky Random Oracle (Extended Abstract...”Få fuldtekst
Electronisk
eBog
12
Udgivet 2010
Indholdsfortegnelse:
“...-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis...”Få fuldtekst
Electronisk
eBog
13
Udgivet 2014
Indholdsfortegnelse:
“... of GF-NLFSR structure with SPN round function -- Misuse-Resistant Variants of the OMD Authenticated...”Få fuldtekst
Electronisk
eBog
14
Udgivet 2008
Indholdsfortegnelse:
“... Memory Authentication -- Database and System Security -- An Efficient PIR Construction Using Trusted...”Få fuldtekst
Electronisk
eBog
15
Udgivet 2008
Indholdsfortegnelse:
“...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...”Få fuldtekst
Electronisk
eBog
16
Udgivet 2006
Indholdsfortegnelse:
“... Structures for Copyright Protection -- Boolean Functions and Stream Ciphers -- A Note of Perfect Nonlinear...”Få fuldtekst
Electronisk
eBog
17
Udgivet 2005
Indholdsfortegnelse:
“... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...”Få fuldtekst
Electronisk
eBog
18
Udgivet 2007
Indholdsfortegnelse:
“... Data Structures -- New Construction of Group Secret Handshakes Based on Pairings -- nPAKE?+?: A...”Få fuldtekst
Electronisk
eBog
19
Udgivet 2013
Indholdsfortegnelse:
“... Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining...”Få fuldtekst
Electronisk
eBog
20
Udgivet 2010
Indholdsfortegnelse:
“...Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure...”Få fuldtekst
Electronisk
eBog



