History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 23 total

Smart energy grid security workshop (SEGS’13). (English)
ACM Conference on Computer and Communications Security, 1491-1492(2013)
WorldCat.org
1
Implementation of privacy-friendly aggregation for the smart grid. (English)
SEGS@CCS, 65-74(2013)
WorldCat.org
2
Privacy-friendly aggregation for the smart-grid. (English)
Fischer-Hübner, Simone (ed.) et al., Privacy enhancing technologies. 11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27‒29, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22262-7/pbk). Lecture Notes in Computer Science 6794, 175-191 (2011).
WorldCat.org
3
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511). (English)
Dagstuhl ReportsDagstuhl Reports 1, N0. 12, 62-68(2011)
WorldCat.org
4
Revocation of TPM keys. (English)
Chen, Liqun (ed.) et al., Trusted computing. Second international conference, Trust 2009, Oxford, UK, April 6‒8, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00586-2/pbk). Lecture Notes in Computer Science 5471, 120-132 (2009).
WorldCat.org
5
Flexible muTPMs through disembedding. (English)
ASIACCS, 116-124(2009)
WorldCat.org
6
Reconfigurable Physical Unclonable Functions ‒ Enabling Technology for Tamper-Resistant Storage. (English)
HOST, 22-29(2009)
WorldCat.org
7
Trust in Consumer Electronics. (English)
ISSE, 139-143(2008)
WorldCat.org
8
Private policy negotiation. (English)
Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27‒March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 81-95 (2006).
WorldCat.org
9
Security in Next Generation Consumer Electronic Devices. (English)
ISSE, 45-53(2006)
WorldCat.org
10
Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. (English)
Privacy Enhancing Technologies, 172-189(2006)
WorldCat.org
11
Secure data management in trusted computing. (English)
Rao, Josyula R. (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2005. 7th international workshop, Edinburgh, UK, August 29‒September 1, 2005. Proceedings. Berlin: Springer (ISBN 978-3-540-28474-1/pbk). Lecture Notes in Computer Science 3659, 324-338 (2005).
WorldCat.org
12
Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. (English)
J. Cryptology 18, No. 3, 219-246 (2005).
WorldCat.org
13
Optimistic asynchronous atomic broadcast. (English)
Caires, Luís (ed.) et al., Automata, languages and programming. 32nd international colloquium, ICALP 2005, Lisbon, Portugal, July 11‒15, 2005. Proceedings. Berlin: Springer (ISBN 3-540-27580-0/pbk). Lecture Notes in Computer Science 3580, 204-215 (2005).
WorldCat.org
14
Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services. (English)
EUC Workshops, 797-806(2005)
WorldCat.org
15
Personal Rights Management- Enabling Privacy Rights in Digital Online Content. (English)
Communications and Multimedia Security, 266-268(2005)
WorldCat.org
16
Exploring unknown environments with obstacles. (English)
Algorithmica 32, No. 1, 123-143 (2002).
WorldCat.org
17
Optimistic Byzantine Agreement. (English)
SRDS, 352-357(2002)
WorldCat.org
18
Asynchronous verifiable secret sharing and proactive cryptosystems. (English)
ACM Conference on Computer and Communications Security, 88-97(2002)
WorldCat.org
19
Secure and efficient asynchronous broadcast protocols. (Extended abstract). (English)
Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 524-541 (2001).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 23 total

Valid XHTML 1.0 Transitional Valid CSS!