Search results for: Mark Manulis
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Privacy and Anonymity > 402-419
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Lightweight Authentication > 85-99
International Journal of Information Security > 2016 > 15 > 6 > 597-620
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2010 > Public-Key Encryption > 333-350
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Privacy and Anonymity > 420-437
Lecture Notes in Computer Science > Privacy Enhancing Technologies > Privacy Enhancing Technologies Symposium > 149-165
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Digital Signature > 87-104
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > Workshop on Ubiquitous Applications and Security Service (UASS 7) > 603-621
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2010 > Keys and PUFs > 351-368
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 3: Applied Crypto I > 147-165
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Key Management and Key Exchange > 1-15
Lecture Notes in Computer Science > Advances in Information and Computer Security > Public-Key Cryptography (2) > 292-307