Search results for: Sven Laur
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 5: Privacy Enhancing Technologies > 192-206
Lecture Notes in Computer Science > Cryptology and Network Security > Authentication and Signatures > 90-107
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptographic Protocols > 207-225
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2008 > Session IV: Identification, Broadcast and Key Agreement > 197-213
Lecture Notes in Computer Science > Information and Communications Security > Cryptographic Protocols > 97-111
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptographic Applications > 50-65
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > Public Key Cryptosystem > 104-120