Search results for: Duong Hieu Phan
Algorithmica > 2017 > 79 > 4 > 1318-1352
Lecture Notes in Computer Science > Selected Areas in Cryptography > Secret Key Cryptography I > 182-197
Lecture Notes in Computer Science > Progress in Cryptology - VIETCRYPT 2006 > Public-Key Encryption > 354-365
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2004 > Public Key Encryption > 63-77
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2005 > Broadcast Encryption and Traitor Tracing > 542-558
Lecture Notes in Computer Science > Information Theoretic Security > Secure and Reliable Communication II > 171-182
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Public Key Cryptography I > 1-18
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2009 > Group and Broadcast Encryption > 189-205
Lecture Notes in Computer Science > Security in Communication Networks > Reduction of Security/Primitives > 33-46
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 8: Broadcast Encryption > 377-394
Lecture Notes in Computer Science > Automata, Languages and Programming > Multi-party Protocols > 264-275
International Journal of Information Security > 2013 > 12 > 4 > 251-265
Algorithmica > 2013 > 67 > 3 > 418-448
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 6 > 1695 - 1706