History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 22 total

Smart energy grid security workshop (SEGS’13). (English)
ACM Conference on Computer and Communications Security, 1491-1492(2013)
WorldCat.org
1
Privacy-friendly aggregation for the smart-grid. (English)
Fischer-Hübner, Simone (ed.) et al., Privacy enhancing technologies. 11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27‒29, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22262-7/pbk). Lecture Notes in Computer Science 6794, 175-191 (2011).
WorldCat.org
2
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511). (English)
Dagstuhl ReportsDagstuhl Reports 1, N0. 12, 62-68(2011)
WorldCat.org
3
Revocation of TPM keys. (English)
Chen, Liqun (ed.) et al., Trusted computing. Second international conference, Trust 2009, Oxford, UK, April 6‒8, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00586-2/pbk). Lecture Notes in Computer Science 5471, 120-132 (2009).
WorldCat.org
4
Reconfigurable Physical Unclonable Functions ‒ Enabling Technology for Tamper-Resistant Storage. (English)
HOST, 22-29(2009)
WorldCat.org
5
Flexible muTPMs through disembedding. (English)
ASIACCS, 116-124(2009)
WorldCat.org
6
Trust in Consumer Electronics. (English)
ISSE, 139-143(2008)
WorldCat.org
7
Private policy negotiation. (English)
Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27‒March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 81-95 (2006).
WorldCat.org
8
Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. (English)
Privacy Enhancing Technologies, 172-189(2006)
WorldCat.org
9
Security in Next Generation Consumer Electronic Devices. (English)
ISSE, 45-53(2006)
WorldCat.org
10
Secure data management in trusted computing. (English)
Rao, Josyula R. (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2005. 7th international workshop, Edinburgh, UK, August 29‒September 1, 2005. Proceedings. Berlin: Springer (ISBN 978-3-540-28474-1/pbk). Lecture Notes in Computer Science 3659, 324-338 (2005).
WorldCat.org
11
Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. (English)
J. Cryptology 18, No. 3, 219-246 (2005).
WorldCat.org
12
Optimistic asynchronous atomic broadcast. (English)
Caires, Luís (ed.) et al., Automata, languages and programming. 32nd international colloquium, ICALP 2005, Lisbon, Portugal, July 11‒15, 2005. Proceedings. Berlin: Springer (ISBN 3-540-27580-0/pbk). Lecture Notes in Computer Science 3580, 204-215 (2005).
WorldCat.org
13
Personal Rights Management- Enabling Privacy Rights in Digital Online Content. (English)
Communications and Multimedia Security, 266-268(2005)
WorldCat.org
14
Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services. (English)
EUC Workshops, 797-806(2005)
WorldCat.org
15
Exploring unknown environments with obstacles. (English)
Algorithmica 32, No. 1, 123-143 (2002).
WorldCat.org
16
Optimistic Byzantine Agreement. (English)
SRDS, 352-357(2002)
WorldCat.org
17
Asynchronous verifiable secret sharing and proactive cryptosystems. (English)
ACM Conference on Computer and Communications Security, 88-97(2002)
WorldCat.org
18
Secure and efficient asynchronous broadcast protocols. (Extended abstract). (English)
Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 524-541 (2001).
WorldCat.org
19
Distributed trust. (English)
Distributed trust., 1-138(2001)
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 22 total

Valid XHTML 1.0 Transitional Valid CSS!