Found: 6
Select item for more details and to access through your institution.
Security and Composition of Multiparty Cryptographic Protocols.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 1, p. 143, doi. 10.1007/s001459910006
- By:
- Publication type:
- Article
Randomness versus Fault-Tolerance.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 1, p. 107, doi. 10.1007/s001459910005
- By:
- Publication type:
- Article
Maintaining Authenticated Communication in the Presence of Break-Ins.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 1, p. 61, doi. 10.1007/s001459910004
- By:
- Publication type:
- Article
Player Simulation and General Adversary Structures in Perfect Multiparty Computation.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 1, p. 31, doi. 10.1007/s001459910003
- By:
- Publication type:
- Article
Secure Communication in Minimal Connectivity Models.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 1, p. 9, doi. 10.1007/s001459910002
- By:
- Publication type:
- Article
Preface.
- Published in:
- Journal of Cryptology, 2000, v. 13, n. 1, p. 1, doi. 10.1007/s001459910001
- By:
- Publication type:
- Article