Search Result Save to File Save as CSV
Your search for 38226 returns 3299 document(s)
Effecient zero-knowledge proofs for some practical graph problems, (LNCS-Lecture Notes in Computer Science 2576) Hal 290-302
Author: Yvo Desmedt; Yongge Wang; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New Notion of Soundness in bare public-key model, (LNCS-Lecture Notes in Computer Science 2576) Hal 318-325
Author: Shirley H.C. Cheung; Xiaotie Deng; C.H. Lee; Yunlei Zhao; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Robust information-theoretic private information retrieval, (LNCS-Lecture Notes in Computer Science 2576) Hal 326-341
Author: Amos Beimel; Yoav Stahl; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Trading players for efficiency in unconditional multiparty computation, (LNCS-Lecture Notes in Computer Science 2576) Hal 342-353
Author: B. Prabhu; K. Srinathan; C. Pandu Rangan; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secret sharing schemes on access structures with intersection number equal to one (LNCS-Lecture Notes in Computer Science 2576) 354
Author: Jaume Marti-Farre; Carles Padro; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Optimized X2-attack against RC6, (LNCS-Lecture Notes in Computer Science 2576) Hal 16-32
Author: Norihisa Isogai; Takashi Matsunaka; Atsuko Miyaji; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Anonymity-enhanced pseudonym system, (LNCS-Lecture Notes in Computer Science 2576)Hal 33-47
Author: Yuko Tamura; Atsuko Miyaji; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An IP traceback scheme integrating DPM and PPM, (LNCS-Lecture Notes in Computer Science 2576) Hal 76-85
Author: Fan Min; Jun-yan Zhang; Guo-wie Yang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Improved scalable hash chain traversal, (LNCS-Lecture Notes in Computer Science 2576) Hal 86-95
Author: Sung-Ryul Kim; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next