Topaicí Molta laistigh de do chuardach.
Topaicí Molta laistigh de do chuardach.
Cuardaigh malartuithe:
protocols security » protocol security, protocols secure
function function » function functional, functions functional, function dysfunction
https function » its function, sites function, ups function
function https » functions https, fiction https
protocols security » protocol security, protocols secure
function function » function functional, functions functional, function dysfunction
https function » its function, sites function, ups function
function https » functions https, fiction https
1
Clár Ábhair:
“...Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation...”
Faigh an téacs iomlán
Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
2
Clár Ábhair:
“... Adversaries -- Covert Adversaries -- Specific Constructions -- Sigma Protocols and Efficient Zero-Knowledge1...”
Faigh an téacs iomlán
Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
3
Clár Ábhair:
“...Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC) -- Internet...”
Faigh an téacs iomlán
Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
4
“...A secure method of identification is crucial to avoid computer deception dynamics. This could...”
Faigh an téacs iomlán
Faigh an téacs iomlán
Article
5
Clár Ábhair:
“... for Internet Security Protocols -- Scalable Key Distribution Schemes -- Scalable Extensions of Non-scalable...”
Faigh an téacs iomlán
Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
6
Foilsithe 2008
Clár Ábhair:
“... Scheme and Its Secure Version -- Application of Hash Functions -- Leaky Random Oracle (Extended Abstract...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
7
Foilsithe 2013
Clár Ábhair:
“...On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
8
Foilsithe 2010
Clár Ábhair:
“...-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
9
Foilsithe 2007
Clár Ábhair:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
10
Foilsithe 2014
Clár Ábhair:
“... -- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures -- Protocol -- Verifiable...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
11
Foilsithe 2007
Clár Ábhair:
“... Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
12
Foilsithe 2008
Clár Ábhair:
“... Memory Authentication -- Database and System Security -- An Efficient PIR Construction Using Trusted...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
13
Foilsithe 2006
Clár Ábhair:
“... Exchange Protocol for Secure Credential Services -- A Non-malleable Group Key Exchange Protocol Robust...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
14
Foilsithe 2008
Clár Ábhair:
“... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
15
Foilsithe 2008
Clár Ábhair:
“...Cryptosystems -- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings -- Hybrid Damgård...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
16
Foilsithe 2010
Clár Ábhair:
“... -- Group Message Authentication -- Cryptographic Protocols II -- Fast Secure Computation of Set...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
17
Foilsithe 2005
Clár Ábhair:
“... Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
18
Foilsithe 2008
Clár Ábhair:
“...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
19
Foilsithe 2006
Clár Ábhair:
“...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar
20
Foilsithe 2006
Clár Ábhair:
“... Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions -- Attribute-Based Authentication...”Faigh an téacs iomlán
Leictreonach
ríomhLeabhar



