Search Result Save to File Save as CSV
Your search for 38223 returns 2664 document(s)
Differential cryptanalysis of a reduced-round SEED, (LNCS-Lecture Notes in Computer Science 2576) Hal 186-198
Author: Hitoshi Yanami; Takeshi Shimoyama; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Medical information privacy assurance: cryptographic and system aspects, (LNCS-Lecture Notes in Computer Science 2576) Hal 199-218
Author: Giuseppe Ataniese; Reza Curtmola; Breno de Medeiros; Darren Davis; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A format-independent architecture for run-time integrity checking of executable code, (LNCS-Lecture Notes in Computer Science 2576) Hal 219-233
Author: Luigi Catuogno; Ivan Visconti; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Forward-secure signatures with fast key update, (LNCS-Lecture Notes in Computer Science 2576) Hal 241-256
Author: Anton Kozlov; Leonid Reyzin; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Constructing elliptic curves with prescribed embedding degrees, (LNCS-Lecture Notes in Computer Science 2576) Hal 257-267
Author: Paulo S.L.M. Baretto; Ben Lynn; Michael Scott; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Effecient zero-knowledge proofs for some practical graph problems, (LNCS-Lecture Notes in Computer Science 2576) Hal 290-302
Author: Yvo Desmedt; Yongge Wang; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New Notion of Soundness in bare public-key model, (LNCS-Lecture Notes in Computer Science 2576) Hal 318-325
Author: Shirley H.C. Cheung; Xiaotie Deng; C.H. Lee; Yunlei Zhao; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Robust information-theoretic private information retrieval, (LNCS-Lecture Notes in Computer Science 2576) Hal 326-341
Author: Amos Beimel; Yoav Stahl; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Trading players for efficiency in unconditional multiparty computation, (LNCS-Lecture Notes in Computer Science 2576) Hal 342-353
Author: B. Prabhu; K. Srinathan; C. Pandu Rangan; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secret sharing schemes on access structures with intersection number equal to one (LNCS-Lecture Notes in Computer Science 2576) 354
Author: Jaume Marti-Farre; Carles Padro; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next