Wyniki wyszukiwania dla: Nikos Triandopoulos
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks > 354-372
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2003 > Authentication Structures > 295-313
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2008 > Cryptographic Protocols > 407-424
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Outsourcing and Delegating Computation > 91-110
Lecture Notes in Computer Science > Pairing-Based Cryptography - Pairing 2010 > Applications: Code Generation, Time-Released Encryption, Cloud Computing > 246-264
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2009 > Cryptography and Game-Theory > 541-558
Lecture Notes in Computer Science > Automata, Languages and Programming > Cryptography and Complexity > 153-165
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Security and Privacy in Communication Networks > Secure Multicast, Emerging Technologies > 437-447
Algorithmica > 2016 > 74 > 2 > 664-712
Pervasive and Mobile Computing > 2011 > 7 > 1 > 16-30
Algorithmica > 2011 > 60 > 3 > 505-552