Your search for 37619 returns 3720 document(s) |
How to convert any digital signature scheme into a group signature scheme, (LNCS-Lecture Notes in Computer Science 1361) Hal 177-190 |
Author: Holger Petersen; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A key recovery mechanism for reliable group key management, (LNCS-Lecture Notes in Computer Science 2576) Hal 372-386 |
Author: Taenam Cho; Sang-Ho Lee; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient re-keying protocols for multicast encryption, (LNCS-Lecture Notes in Computer Science 2576) Hal 119-132 |
Author: Giovanni Di Crescenzo; Olga Kornievskaia; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Single-chip FPGA implementation of the advanced encryption standard algorithm, (LNCS-Lecture Notes in Computer Science 2147) Hal 152-161 |
Author: Maire McLoone; John V. McCanny; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
JBits implementations of the advanced encryption standard (Rijndael), (LNCS-Lecture Notes in Computer Science 2147) Hal 162-171 |
Author: Scott McMillan; Cameron Patterson; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Helix: Fast encryption and authentication single cryptographic primitive, (LNCS-Lecture Notes in Computer Science 2887) Hal 330-346 |
Author: Niels Ferguson; Doug Whiting; Bruce Schneier; John Kelsey; Stefan Lucks; Tadayoshi Kohno; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Practical symmetric on-line encryption, (LNCS-Lecture Notes in Computer Science 2887) Hal 362-375 |
Author: Pierre-Alain Forque; Gwenaelle Martinet; Guillaume Poupard; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An IP traceback scheme integrating DPM and PPM, (LNCS-Lecture Notes in Computer Science 2576) Hal 76-85 |
Author: Fan Min; Jun-yan Zhang; Guo-wie Yang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A threshold GQ signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 137-150 |
Author: Li-Shan Liu; Cheng-Kang Chu; Wen-Guey Tzeng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Improved algebraic traitor tracing scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 217-227 |
Author: Chunyan Bai; Guiliang Feng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|