Found: 5
Select item for more details and to access through your institution.
Less is more: relaxed yet composable security notions for key exchange.
- Published in:
- International Journal of Information Security, 2013, v. 12, n. 4, p. 267, doi. 10.1007/s10207-013-0192-y
- By:
- Publication type:
- Article
An optimistic fair exchange protocol with active intermediaries.
- Published in:
- International Journal of Information Security, 2013, v. 12, n. 4, p. 299, doi. 10.1007/s10207-013-0194-9
- By:
- Publication type:
- Article
Security policies enforcement using finite and pushdown edit automata.
- Published in:
- International Journal of Information Security, 2013, v. 12, n. 4, p. 319, doi. 10.1007/s10207-013-0195-8
- By:
- Publication type:
- Article
A shuffle to achieve high efficiency through pre-computation and batch verification.
- Published in:
- International Journal of Information Security, 2013, v. 12, n. 4, p. 337, doi. 10.1007/s10207-013-0193-x
- By:
- Publication type:
- Article
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts.
- Published in:
- International Journal of Information Security, 2013, v. 12, n. 4, p. 251, doi. 10.1007/s10207-013-0190-0
- By:
- Publication type:
- Article