History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 165 total

On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax. (English)
C2SI, 27-44(2015)
WorldCat.org
1
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey. (English)
Computers & SecurityComputers & Security 50, 16-32(2015)
WorldCat.org
2
Trust views for the web PKI. (English)
Katsikas, Sokratis (ed.) et al., Public key infrastructures, services and applications. 10th European workshop, EuroPKI 2013, Egham, UK, September 12‒13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-53996-1/pbk). Lecture Notes in Computer Science 8341, 134-151 (2014).
WorldCat.org
3
On the efficiency of provably secure NTRU. (English)
Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1‒3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 22-39 (2014).
WorldCat.org
4
Full analysis of {\sc PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures. (English)
Des. Codes Cryptography 73, No. 3, 997-1022 (2014).
WorldCat.org
5
Towards lattice based aggregate signatures. (English)
Pointcheval, David (ed.) et al., Progress in cryptology ‒ AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28‒30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 336-355 (2014).
WorldCat.org
6
Long term confidentiality: a survey. (English)
Des. Codes Cryptography 71, No. 3, 459-478 (2014).
WorldCat.org
7
A Performance Analysis of Long-Term Archiving Techniques. (English)
HPCC/CSS/ICESS, 878-889(2014)
WorldCat.org
8
Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method. (English)
IEICE TransactionsIEICE Transactions 97-A, N0. 9, 1952-1961(2014)
WorldCat.org
9
A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing. (English)
ISCC, 1-6(2014)
WorldCat.org
10
Introducing asymmetric DC-Nets. (English)
CNS, 508-509(2014)
WorldCat.org
11
Mutant Differential Fault Analysis of Trivium MDFA. (English)
ICISC, 433-446(2014)
WorldCat.org
12
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland. (English)
Datenschutz und DatensicherheitDatenschutz und Datensicherheit 38, N0. 2, 98-102(2014)
WorldCat.org
13
Optimal parameters for $XMSS^{MT }$. (English)
Cuzzocrea, Alfredo (ed.) et al., Security engineering and intelligence informatics. CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40587-7/pbk). Lecture Notes in Computer Science 8128, 194-208 (2013).
WorldCat.org
15
Cryptanalysis of 2-layer nonlinear piece in hand method. (English)
Cuzzocrea, Alfredo (ed.) et al., Security engineering and intelligence informatics. CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40587-7/pbk). Lecture Notes in Computer Science 8128, 91-104 (2013).
WorldCat.org
16
How to avoid the breakdown of public key infrastructures. Forward secure signatures for certificate authorities. (English)
De Capitani di Vimercati, Sabrina (ed.) et al., Public key infrastructures, services and applications. 9th European workshop, EuroPKI 2012, Pisa, Italy, September 13‒14, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-40011-7/pbk). Lecture Notes in Computer Science 7868, 53-68 (2013).
WorldCat.org
17
Introduction to public key infrastructures. (English)
Berlin: Springer (ISBN 978-3-642-40656-0/hbk; 978-3-642-40657-7/ebook). xv, 194~p. EUR~53.49; SFR~67.00; \sterling~44.99; \$~69.99 (2013).
WorldCat.org
18
On the security of the Winternitz one-time signature scheme. (English)
Int. J. Appl. Cryptogr. 3, No. 1, 84-96 (2013).
WorldCat.org
19
Towards a publicly-verifiable mix-net providing everlasting privacy. (English)
Sadeghi, Ahmad-Reza (ed.), Financial cryptography and data security. 17th international conference, FC 2013, Okinawa, Japan, April 1‒5, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-39883-4/pbk). Lecture Notes in Computer Science 7859, 197-204 (2013).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 165 total

Valid XHTML 1.0 Transitional Valid CSS!