History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 26 total

Second Smart Energy Grid Security Workshop (SEGS 2014). (English)
ACM Conference on Computer and Communications Security, 1556-1557(2014)
WorldCat.org
1
Forward-Secure Distributed Encryption. (English)
Privacy Enhancing Technologies, 123-142(2014)
WorldCat.org
2
Smart energy grid security workshop (SEGS’13). (English)
ACM Conference on Computer and Communications Security, 1491-1492(2013)
WorldCat.org
3
Implementation of privacy-friendly aggregation for the smart grid. (English)
SEGS@CCS, 65-74(2013)
WorldCat.org
4
Privacy-friendly aggregation for the smart-grid. (English)
Fischer-Hübner, Simone (ed.) et al., Privacy enhancing technologies. 11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27‒29, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22262-7/pbk). Lecture Notes in Computer Science 6794, 175-191 (2011).
WorldCat.org
5
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511). (English)
Dagstuhl ReportsDagstuhl Reports 1, N0. 12, 62-68(2011)
WorldCat.org
6
Revocation of TPM keys. (English)
Chen, Liqun (ed.) et al., Trusted computing. Second international conference, Trust 2009, Oxford, UK, April 6‒8, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00586-2/pbk). Lecture Notes in Computer Science 5471, 120-132 (2009).
WorldCat.org
7
Flexible muTPMs through disembedding. (English)
ASIACCS, 116-124(2009)
WorldCat.org
8
Reconfigurable Physical Unclonable Functions ‒ Enabling Technology for Tamper-Resistant Storage. (English)
HOST, 22-29(2009)
WorldCat.org
9
Trust in Consumer Electronics. (English)
ISSE, 139-143(2008)
WorldCat.org
10
Private policy negotiation. (English)
Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27‒March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 81-95 (2006).
WorldCat.org
11
Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. (English)
Privacy Enhancing Technologies, 172-189(2006)
WorldCat.org
12
Security in Next Generation Consumer Electronic Devices. (English)
ISSE, 45-53(2006)
WorldCat.org
13
Secure data management in trusted computing. (English)
Rao, Josyula R. (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2005. 7th international workshop, Edinburgh, UK, August 29‒September 1, 2005. Proceedings. Berlin: Springer (ISBN 978-3-540-28474-1/pbk). Lecture Notes in Computer Science 3659, 324-338 (2005).
WorldCat.org
14
Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. (English)
J. Cryptology 18, No. 3, 219-246 (2005).
WorldCat.org
15
Optimistic asynchronous atomic broadcast. (English)
Caires, Luís (ed.) et al., Automata, languages and programming. 32nd international colloquium, ICALP 2005, Lisbon, Portugal, July 11‒15, 2005. Proceedings. Berlin: Springer (ISBN 3-540-27580-0/pbk). Lecture Notes in Computer Science 3580, 204-215 (2005).
WorldCat.org
16
Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services. (English)
EUC Workshops, 797-806(2005)
WorldCat.org
17
Trusted Computing, or the Gatekeeper. (English)
The Information Society, 339-354(2005)
WorldCat.org
18
Personal Rights Management- Enabling Privacy Rights in Digital Online Content. (English)
Communications and Multimedia Security, 266-268(2005)
WorldCat.org
19
Exploring unknown environments with obstacles. (English)
Algorithmica 32, No. 1, 123-143 (2002).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 26 total

Valid XHTML 1.0 Transitional Valid CSS!