Search results for: Jacques Traoré
IET Information Security > 2016 > 10 > 6 > 332 - 347
Lecture Notes in Computer Science > Information and Communication Security > Electronic Commerce and Secret Sharing > 87-102
Lecture Notes in Computer Science > Information Security and Privacy > Electronic Commerce > 228-243
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Attacks and Counter-Measures II > 202-214
Lecture Notes in Computer Science > Information Security and Privacy > Electronic Commerce II > 427-442
Lecture Notes in Computer Science > Information Security and Privacy > Mobile and Network Security > 237-248
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Short Papers > 148-153
Lecture Notes in Computer Science > E-Voting and Identity > Improvements/Extensions of Existing Approaches > 156-165
IFIP — The International Federation for Information Processing > Smart Card Research and Advanced Applications VI > Privacy > 83-98
Lecture Notes in Computer Science > Cryptology and Network Security > Cryptographic Protocols > 278-297
Lecture Notes in Computer Science > Pairing-Based Cryptography – Pairing 2007 > Protocol I > 268-292
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2011 > Cryptographic Schemes > 206-223