Search results for: Masahiro Mambo
Future Generation Computer Systems > 2018 > 78 > P2 > 680-698
Lecture Notes in Computer Science
Lecture Notes in Computer Science > Pairing-Based Cryptography - Pairing 2010 > ID-Based Encryption Schemes > 327-346
Lecture Notes in Computer Science > Information Security and Privacy > Digital Signatures II > 352-367
Lecture Notes in Computer Science > Information Security > Electronic Money, Key Recovery, and Electronic Voting > 207-224
Lecture Notes in Computer Science > Progress in Cryptology – INDOCRYPT 2007 > Asymmetric Cryptosystem > 297-311
Lecture Notes in Computer Science > Ubiquitous Convergence Technology > Mobile, Wireless, and Ad Hoc Networking > 140-149
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2003 > Chosen-Ciphertext Security > 227-243
Lecture Notes in Computer Science > Information and Communications Security > Session 3A. Proxy Cryptosystems > 383-400
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2002 > Applications > 339-353