Cuardaigh malartuithe:
protocols security » protocol security, protocols secure
function function » function functional, functions functional, function dysfunction
https function » its function, sites function, ups function
function https » functions https, fiction https
1
Clár Ábhair: ...Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
2
Clár Ábhair: ... Adversaries -- Covert Adversaries -- Specific Constructions -- Sigma Protocols and Efficient Zero-Knowledge1...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
3
Clár Ábhair: ...Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC) -- Internet...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
4
...A secure method of identification is crucial to avoid computer deception dynamics. This could...
Faigh an téacs iomlán
Article
5
Clár Ábhair: ... for Internet Security Protocols -- Scalable Key Distribution Schemes -- Scalable Extensions of Non-scalable...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
6
Foilsithe 2008
Clár Ábhair: ... Scheme and Its Secure Version -- Application of Hash Functions -- Leaky Random Oracle (Extended Abstract...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
7
Foilsithe 2013
Clár Ábhair: ...On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
8
Foilsithe 2010
Clár Ábhair: ...-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
9
Foilsithe 2007
Clár Ábhair: ... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
10
Foilsithe 2014
Clár Ábhair: ... -- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures -- Protocol -- Verifiable...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
11
Foilsithe 2007
Clár Ábhair: ... Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
12
Foilsithe 2008
Clár Ábhair: ... Memory Authentication -- Database and System Security -- An Efficient PIR Construction Using Trusted...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
13
Foilsithe 2006
Clár Ábhair: ... Exchange Protocol for Secure Credential Services -- A Non-malleable Group Key Exchange Protocol Robust...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
14
Foilsithe 2008
Clár Ábhair: ... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
15
Foilsithe 2008
Clár Ábhair: ...Cryptosystems -- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings -- Hybrid Damgård...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
16
Foilsithe 2010
Clár Ábhair: ... -- Group Message Authentication -- Cryptographic Protocols II -- Fast Secure Computation of Set...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
17
Foilsithe 2005
Clár Ábhair: ... Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
18
Foilsithe 2008
Clár Ábhair: ...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
19
Foilsithe 2006
Clár Ábhair: ...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar
20
Foilsithe 2006
Clár Ábhair: ... Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions -- Attribute-Based Authentication...
Faigh an téacs iomlán
Leictreonach ríomhLeabhar