Search results for: Amir Herzberg
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2001 > Passwords and Credentials > 328-343
Lecture Notes in Computer Science > Computer Security – ESORICS 2009 > Network Security II > 104-119
Lecture Notes in Computer Science > Trust and Trustworthy Computing > Technical Strand—Short Papers > 282-289
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2005 > Design Principles > 172-190
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’91 > Protocol Design and Analysis > 44-61
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 92 > Key Distribution > 471-486
Lecture Notes in Computer Science > Security and Cryptography for Networks > Anonymity and E-Commerce > 126-140
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’94 > Secure Computations and Protocols > 425-438
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’85 Proceedings > Copy Protection > 158-179
Lecture Notes in Computer Science > Computer Security – ESORICS 2011 > Usability, Ttrust, and Economics of Security and Privacy > 452-471
IFIP — The International Federation for Information Processing > Future Challenges in Security and Privacy for Academia and Industry > Malware, Information Flow and DoS Attacks > 29-40
IFIP — The International Federation for Information Processing > Emerging Challenges for Security, Privacy and Trust > Security Protocols > 342-352
IFIP — The International Federation for Information Processing > Emerging Challenges for Security, Privacy and Trust > Identification and Authentication I > 13-24