History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 31 total

Structural Weaknesses in the Open Smart Grid Protocol. (English)
ARES, 1-10(2015)
WorldCat.org
1
Forward-secure distributed encryption. (English)
De Cristofaro, Emiliano (ed.) et al., Privacy enhancing technologies. 14th international symposium, PETS 2014, Amsterdam, The Netherlands, July 16‒18, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08505-0/pbk). Lecture Notes in Computer Science 8555, 123-142 (2014).
WorldCat.org
2
Second Smart Energy Grid Security Workshop (SEGS 2014). (English)
ACM Conference on Computer and Communications Security, 1556-1557(2014)
WorldCat.org
3
Smart energy grid security workshop (SEGS’13). (English)
ACM Conference on Computer and Communications Security, 1491-1492(2013)
WorldCat.org
4
Implementation of privacy-friendly aggregation for the smart grid. (English)
SEGS@CCS, 65-74(2013)
WorldCat.org
5
Privacy-friendly aggregation for the smart-grid. (English)
Fischer-Hübner, Simone (ed.) et al., Privacy enhancing technologies. 11th international symposium, PETS 2011, Waterloo, ON, Canada, July 27‒29, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22262-7/pbk). Lecture Notes in Computer Science 6794, 175-191 (2011).
WorldCat.org
6
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511). (English)
Dagstuhl Reports 1, N0. 12, 62-68(2011)
WorldCat.org
7
Revocation of TPM keys. (English)
Chen, Liqun (ed.) et al., Trusted computing. Second international conference, Trust 2009, Oxford, UK, April 6‒8, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00586-2/pbk). Lecture Notes in Computer Science 5471, 120-132 (2009).
WorldCat.org
8
Reconfigurable Physical Unclonable Functions ‒ Enabling Technology for Tamper-Resistant Storage. (English)
HOST, 22-29(2009)
WorldCat.org
9
Flexible muTPMs through disembedding. (English)
ASIACCS, 116-124(2009)
WorldCat.org
10
Trust in Consumer Electronics. (English)
ISSE, 139-143(2008)
WorldCat.org
11
Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays. (English)
ISSE, 313-321(2007)
WorldCat.org
12
Rights Management Technologies: A Good Choice for Securing Electronic Health Records? (English)
ISSE, 178-187(2007)
WorldCat.org
13
Trusted Platforms. (English)
Security, Privacy, and Trust in Modern Data Management, 119-131(2007)
WorldCat.org
14
Private policy negotiation. (English)
Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27‒March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 81-95 (2006).
WorldCat.org
15
Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. (English)
Privacy Enhancing Technologies, 172-189(2006)
WorldCat.org
16
Security in Next Generation Consumer Electronic Devices. (English)
ISSE, 45-53(2006)
WorldCat.org
17
Secure data management in trusted computing. (English)
Rao, Josyula R. (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2005. 7th international workshop, Edinburgh, UK, August 29‒September 1, 2005. Proceedings. Berlin: Springer (ISBN 978-3-540-28474-1/pbk). Lecture Notes in Computer Science 3659, 324-338 (2005).
WorldCat.org
18
Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. (English)
J. Cryptology 18, No. 3, 219-246 (2005).
WorldCat.org
19
Optimistic asynchronous atomic broadcast. (English)
Caires, Luís (ed.) et al., Automata, languages and programming. 32nd international colloquium, ICALP 2005, Lisbon, Portugal, July 11‒15, 2005. Proceedings. Berlin: Springer (ISBN 3-540-27580-0/pbk). Lecture Notes in Computer Science 3580, 204-215 (2005).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 31 total

Valid XHTML 1.0 Transitional Valid CSS!