Search results for: Barbara Masucci
Information Sciences > 2017 > 387 > C > 56-74
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 10 > 2349 - 2364
IEEE Transactions on Dependable and Secure Computing > 2016 > 13 > 4 > 451 - 460
Lecture Notes in Computer Science > Selected Areas in Cryptography > Security Protocols and Applications > 130-144
Lecture Notes in Computer Science > Theoretical Computer Science > Security and Cryptography > 342-354
Lecture Notes in Computer Science > Computer Security - ESORICS 2000 > Electronic Commerce Protocols > 72-87
Lecture Notes in Computer Science > Mathematical Foundations of Computer Science 2007 > Protocols > 371-382
Lecture Notes in Computer Science > Mathematical Foundations of Computer Science 2009 > Contributed Papers > 247-257
Network Security > 1-32
IEEE Transactions on Dependable and Secure Computing > 2015 > 12 > 4 > 485 - 490
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 4 > 850 - 865
Information Processing Letters > 2013 > 113 > 5-6 > 151-155
Journal of Cryptology > 2012 > 25 > 2 > 243-270
Theoretical Computer Science > 2011 > 412 > 41 > 5684-5699
Theoretical Computer Science > 2010 > 411 > 1 > 213-227
Theoretical Computer Science > 2008 > 407 > 1-3 > 213-230