History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 | next | last

Result 1 to 13 of 13 total

Edge fault tolerance on sparse networks. (English)
Czumaj, Artur (ed.) et al., Automata, languages, and programming. 39th international colloquium, ICALP 2012, Warwick, UK, July 9‒13, 2012. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-31584-8/pbk). Lecture Notes in Computer Science 7392, 452-463 (2012).
WorldCat.org
1
Functional re-encryption and collusion-resistant obfuscation. (English)
Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19‒21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 404-421 (2012).
WorldCat.org
2
Position-based quantum cryptography: impossibility and constructions. (English)
Rogaway, Phillip (ed.), Advances in cryptology ‒ CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14‒18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 429-446 (2011).
WorldCat.org
3
Public-key encryption with efficient amortized updates. (English)
Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13‒15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 17-35 (2010).
WorldCat.org
4
Improved fault tolerance and secure computation on sparse networks. (English)
Abramsky, Samson (ed.) et al., Automata, languages and programming. 37th international colloquium, ICALP 2010, Bordeaux, France, July 6‒10, 2010. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-14161-4/pbk). Lecture Notes in Computer Science 6199, 249-260 (2010).
WorldCat.org
5
Privacy amplification with asymptotically optimal entropy loss. (English)
STOC, 785-794(2010)
WorldCat.org
6
Position based cryptography. (English)
Halevi, Shai (ed.), Advances in cryptology ‒ CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16‒20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 391-407 (2009).
WorldCat.org
7
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. (English)
Joux, Antoine (ed.), Advances in cryptology ‒ EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26‒30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 351-368 (2009).
WorldCat.org
8
A Secure Cryptographic Token Interface. (English)
CSF, 141-153(2009)
WorldCat.org
9
New constructions for UC secure computation using tamper-proof hardware. (English)
Smart, Nigel (ed.), Advances in cryptology ‒ EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13‒17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 545-562 (2008).
WorldCat.org
10
Ring signatures of sub-linear size without random oracles. (English)
Arge, Lars (ed.) et al., Automata, languages and programming. 34th international colloquium, ICALP 2007, Wrocław, Poland, July 9‒13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73419-2/pbk). Lecture Notes in Computer Science 4596, 423-434 (2007).
WorldCat.org
11
Covert Multi-Party Computation. (English)
FOCS, 238-248(2007)
WorldCat.org
12
Improved algorithms for optimal embeddings. (English)
Electron. Colloq. Comput. Complex. 13, No. 110 (2006).
WorldCat.org
13
first | previous | 1 | next | last

Result 1 to 13 of 13 total

Valid XHTML 1.0 Transitional Valid CSS!