Wyniki wyszukiwania dla: Christophe Tartary
Lecture Notes in Computer Science > Cryptology and Network Security > Cryptographic Algorithms and Protocols > 196-213
Lecture Notes in Computer Science > Cryptology and Network Security > Cryptographic Algorithms and Protocols > 162-177
Lecture Notes in Computer Science > Advances in Information and Computer Security > Signatures (2) > 136-151
Lecture Notes in Computer Science > Information Security and Privacy > Access Control and Security > 259-275
Lecture Notes in Computer Science > Cryptology and Network Security > Authentication and Signatures > 108-125
Lecture Notes in Computer Science > Information Security and Cryptology > Cryptographic Schemes > 103-117
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2008 > Multi-Party Computation > 37-53
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 465 - 479
Journal of Cryptology > 2012 > 25 > 4 > 557-600
Information Processing Letters > 2011 > 111 > 10 > 488-493
IEEE Transactions on Information Theory > 2011 > 57 > 9 > 6285 - 6303
International Journal of Information Security > 2008 > 7 > 4 > 265-283