Search results for: Dario Catalano
Designs, Codes and Cryptography > 2018 > 86 > 10 > 2197-2246
Stem Cell Research & Therapy > 2017 > 8 > 1 > 1-11
Journal of Cryptology > 2018 > 31 > 1 > 23-59
IEEE Transactions on Dependable and Secure Computing > 2016 > 13 > 4 > 409 - 410
International Journal of Information Security > 2017 > 16 > 3 > 327-343
Lecture Notes in Computer Science > Public Key Cryptography - PKC 2005 > Signature Schemes > 313-327
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2009 > Key Agreement Protocols > 254-271
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 5: Eclectic Assortment > 255-273
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Public Key Cryptography I > 37-54
Lecture Notes in Computer Science > Automata, Languages and Programming > Security Mechanisms > 298-310
Lecture Notes in Computer Science > Parallel and Distributed Processing and Applications - ISPA 2005 Workshops > Workshop 1: International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP 2005) > 54-63
Lecture Notes in Computer Science > Automata, Languages and Programming > Multi-party Protocols > 300-311