Search Result Save to File Save as CSV
Your search for 17283 returns 3809 document(s)
Protocols using anonymous connections: mobile applications, (LNCS-Lecture Notes in Computer Science 1361) Hal 13-23
Author: Michael G. Reed; Paul F. Syverson; David M. Goldschlag; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Receipt-free electronic voting schemes for large scale elections,(LNCS-Lecture Notes in Computer Science 1361) Hal 25-35
Author: Tatsuaki Okamoto; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Flexible internet secure transactions based on collaborative domains, (LNCS-Lecture Notes in Computer Science 1361) Hal 37-51
Author: Eduardo Solana; Jurgen Harms; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
How to build evidence in a public-key infrastructure for multi-domain environments, (LNCS-Lecture Notes in Computer Science 1361) Hal 53-65
Author: Bruno Crispo; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On signature schemes with threshold verification detecting malicious verifiers, (LNCS-Lecture Notes in Computer Science 1361) Hal 67-78
Author: Holger Petersen; Markus Michels; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Binding bit patterns to real world entities, (LNCS-Lecture Notes in Computer Science 1361) Hal 105-113
Author: Bruce Christianson; James A. Malcolm; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Low cost attacks on tamper resistant devices, (LNCS-Lecture Notes in Computer Science 1361) Hal 125-136
Author: Ross Anderson; Markus Kuhn; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
How to convert any digital signature scheme into a group signature scheme, (LNCS-Lecture Notes in Computer Science 1361) Hal 177-190
Author: Holger Petersen; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next