Found: 12
Select item for more details and to access through your institution.
Seeking Foundations for the Science of Cyber Security: Editorial for Special Issue of Information Systems Frontiers.
- Published in:
- 2021
- By:
- Publication type:
- Editorial
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 4, p. 733, doi. 10.3390/s17040733
- By:
- Publication type:
- Article
Special issue on security and privacy of blockchain technologies.
- Published in:
- 2020
- By:
- Publication type:
- Editorial
Elastic block ciphers: method, security and instantiations.
- Published in:
- International Journal of Information Security, 2009, v. 8, n. 3, p. 211, doi. 10.1007/s10207-008-0075-9
- By:
- Publication type:
- Article
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.
- Published in:
- Computer Journal, 2019, v. 62, n. 4, p. 545, doi. 10.1093/comjnl/bxy122
- By:
- Publication type:
- Article
Scalable public-key tracing and revoking.
- Published in:
- Distributed Computing, 2005, v. 17, n. 4, p. 323, doi. 10.1007/s00446-004-0120-5
- By:
- Publication type:
- Article
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1405, doi. 10.1007/s00145-020-09350-3
- By:
- Publication type:
- Article
Concurrent Knowledge Extraction in Public-Key Models.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 1, p. 156, doi. 10.1007/s00145-014-9191-z
- By:
- Publication type:
- Article
Scalable Protocols for Authenticated Group Key Exchange.
- Published in:
- Journal of Cryptology, 2007, v. 20, n. 1, p. 85, doi. 10.1007/s00145-006-0361-5
- By:
- Publication type:
- Article
Characterization of Security Notions for Probabilistic Private-Key Encryption.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 1, p. 67, doi. 10.1007/s00145-005-0310-8
- By:
- Publication type:
- Article
Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation.
- Published in:
- Journal of Cryptology, 1998, v. 11, n. 2, p. 87, doi. 10.1007/s001459900037
- By:
- Publication type:
- Article
Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation.
- Published in:
- Journal of Cryptology, 1996, v. 9, n. 3, p. 149, doi. 10.1007/s001459900009
- By:
- Publication type:
- Article