Search results for: Julien Bringer
Image and Vision Computing > 2017 > 58 > C > 239-253
Lecture Notes in Computer Science > Cryptology and Network Security > Identification, Authentication and Key Management > 149-161
Lecture Notes in Computer Science > Cryptology and Network Security > Secure Keyword Search and Private Information Retrieval > 175-193
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Key Management > 291-308
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2009 > Lightweight Cryptology > 272-289
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2009 > Cryptographic Protocols > 305-322
Lecture Notes in Computer Science > Security and Cryptography for Networks > Session 2: Protocols I > 77-91
Lecture Notes in Computer Science > Advances in Information and Computer Security > Authentication and Access Control > 219-230
Lecture Notes in Computer Science > Security and Privacy in Ad-Hoc and Sensor Networks > Regular Papers > 113-120
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2009 > Side Channel Attacks > 88-103
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2008 > Cryptographic Protocols > 109-124
Communications in Computer and Information Science > Secure and Trust Computing, Data Management and Applications > STA2011 - Security Track > 105-113