Your search for 38545 returns 2702 document(s) |
Weak forward security in mediated RSA, (LNCS-Lecture Notes in Computer Science 2576) Hal 45-54 |
Author: Gene Tsudik; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122 |
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security protocols for biometrics-based cardholder authentication in smartcards, (LNCS-Lecture Notes in Computer Science 2576) Hal 254-264 |
Author: Luciano Rila; Chris J. Mitchell; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
PS-LTL for constraint-based security protocol analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 439-440 |
Author: Ricardo Corin; Ari Saptawijaya; Sandro Etalle; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Specification and validation of a security policy model, (LNCS-Lecture Notes in Computer Science 670) Hal 42-51 |
Author: Tony Boswell; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of idea-x/2, (LNCS-Lecture Notes in Computer Science 2887) Hal 1-8 |
Author: Havard Raddum; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On plateaued functions and their constructions, (LNCS-Lecture Notes in Computer Science 2887) Hal 54-73 |
Author: Claude Carlet; Emmanuel Prouff; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Linear redundancy in s-boxes, (LNCS-Lecture Notes in Computer Science 2887) Hal 74-86 |
Author: Joanne Fuller; William Millan; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Loosening the knot, (LNCS-Lecture Notes in Computer Science 2887) Hal 87-99 |
Author: Antoine Joux; Frederic the Knot; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the resynchronization attack, (LNCS-Lecture Notes in Computer Science 2887) Hal 100-110 |
Author: Jovan Dj. Golic; Guglielmo Morgari; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|