Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
function structures » functions structures, function structure, functional structures
protocols security » protocol security, protocols secure
https function » its function, sites function, ups function
function structures » functions structures, function structure, functional structures
protocols security » protocol security, protocols secure
https function » its function, sites function, ups function
1
Table of Contents:
“...Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation...”
View full text
View full text
Electronic
eBook
2
Table of Contents:
“... Adversaries -- Covert Adversaries -- Specific Constructions -- Sigma Protocols and Efficient Zero-Knowledge1...”
View full text
View full text
Electronic
eBook
3
Table of Contents:
“...Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC) -- Internet...”
View full text
View full text
Electronic
eBook
4
Table of Contents:
“... for Internet Security Protocols -- Scalable Key Distribution Schemes -- Scalable Extensions of Non-scalable...”
View full text
View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... of the Art and Future Research Directions -- Hardware Intrinsic Security from Physically Unclonable Functions...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“... for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... -- Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme -- Session 2C...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...”View full text
Electronic
eBook
10
Published 2012
Table of Contents:
“... Authentication -- On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time...”View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“... Scheme and Its Secure Version -- Application of Hash Functions -- Leaky Random Oracle (Extended Abstract...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“...-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis...”View full text
Electronic
eBook
13
Published 2014
Table of Contents:
“... of GF-NLFSR structure with SPN round function -- Misuse-Resistant Variants of the OMD Authenticated...”View full text
Electronic
eBook
14
Published 2008
Table of Contents:
“... Memory Authentication -- Database and System Security -- An Efficient PIR Construction Using Trusted...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“... Structures for Copyright Protection -- Boolean Functions and Stream Ciphers -- A Note of Perfect Nonlinear...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...”View full text
Electronic
eBook
18
Published 2007
Table of Contents:
“... Data Structures -- New Construction of Group Secret Handshakes Based on Pairings -- nPAKE?+?: A...”View full text
Electronic
eBook
19
Published 2013
Table of Contents:
“... Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“...Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure...”View full text
Electronic
eBook



