Search alternatives:
function structures » functions structures, function structure, functional structures
protocols security » protocol security, protocols secure
https function » its function, sites function, ups function
1
Table of Contents: ...Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation...
View full text
Electronic eBook
2
Table of Contents: ... Adversaries -- Covert Adversaries -- Specific Constructions -- Sigma Protocols and Efficient Zero-Knowledge1...
View full text
Electronic eBook
3
Table of Contents: ...Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC) -- Internet...
View full text
Electronic eBook
4
Table of Contents: ... for Internet Security Protocols -- Scalable Key Distribution Schemes -- Scalable Extensions of Non-scalable...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... of the Art and Future Research Directions -- Hardware Intrinsic Security from Physically Unclonable Functions...
View full text
Electronic eBook
7
Published 2008
Table of Contents: ... for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... -- Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme -- Session 2C...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...
View full text
Electronic eBook
10
Published 2012
Table of Contents: ... Authentication --  On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... Scheme and Its Secure Version -- Application of Hash Functions -- Leaky Random Oracle (Extended Abstract...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ...-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis...
View full text
Electronic eBook
13
Published 2014
Table of Contents: ... of GF-NLFSR structure with SPN round function -- Misuse-Resistant Variants of the OMD Authenticated...
View full text
Electronic eBook
14
Published 2008
Table of Contents: ... Memory Authentication -- Database and System Security -- An Efficient PIR Construction Using Trusted...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...
View full text
Electronic eBook
16
Published 2006
Table of Contents: ... Structures for Copyright Protection -- Boolean Functions and Stream Ciphers -- A Note of Perfect Nonlinear...
View full text
Electronic eBook
17
Published 2005
Table of Contents: ... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ... Data Structures -- New Construction of Group Secret Handshakes Based on Pairings -- nPAKE?+?: A...
View full text
Electronic eBook
19
Published 2013
Table of Contents: ... Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ...Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure...
View full text
Electronic eBook