Search results for: Olivier Pereira
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2010 > Cryptographic Algorithms > 133-150
Lecture Notes in Computer Science > Computer Security – ESORICS 2011 > Cryptography and Protocol Analysis > 335-354
Lecture Notes in Computer Science > Distributed Computing > Exploring Gafni’s Reduction Land: From Ω k to Wait-Free Adaptive $(2p-\lceil\frac{p}{k}\rceil)$ -Renaming Via k-Set Agreement > 238-253
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Privacy and Digital Rights > 98-115
Lecture Notes in Computer Science > Information Security and Cryptology > Secure Computing > 125-138
Lecture Notes in Computer Science > E-Voting and Identity > Improvements/Extensions of Existing Approaches > 137-149
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Randomness and Its Use > 1-20
Information Security and Cryptography > Towards Hardware-Intrinsic Security > Hardware-based Cryptography > 99-134
2015 IEEE Symposium on Security and Privacy > 499 - 516
Discrete Event Dynamic Systems > 2008 > 18 > 1 > 111-159