Found: 7
Select item for more details and to access through your institution.
Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate.
- Published in:
- Computer Journal, 2013, v. 56, n. 4, p. 464, doi. 10.1093/comjnl/bxs133
- By:
- Publication type:
- Article
Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.
- Published in:
- Computer Journal, 2013, v. 56, n. 4, p. 407, doi. 10.1093/comjnl/bxs115
- By:
- Publication type:
- Article
HISS: A HIghly Scalable Scheme for Group Rekeying.
- Published in:
- Computer Journal, 2013, v. 56, n. 4, p. 508, doi. 10.1093/comjnl/bxs152
- By:
- Publication type:
- Article
Dynamic Access Control Policies: Specification and Verification.
- Published in:
- Computer Journal, 2013, v. 56, n. 4, p. 440, doi. 10.1093/comjnl/bxs102
- By:
- Publication type:
- Article
A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach.
- Published in:
- Computer Journal, 2013, v. 56, n. 4, p. 422, doi. 10.1093/comjnl/bxs112
- By:
- Publication type:
- Article
Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure.
- Published in:
- Computer Journal, 2013, v. 56, n. 4, p. 497, doi. 10.1093/comjnl/bxs151
- By:
- Publication type:
- Article
Protection Structures in Multithreaded Systems.
- Published in:
- Computer Journal, 2013, v. 56, n. 4, p. 478, doi. 10.1093/comjnl/bxs138
- By:
- Publication type:
- Article