Search results for: Stephan Krenn
e & i Elektrotechnik und Informationstechnik > 2017 > 134 > 7 > 364-369
Lecture Notes in Computer Science > Public Key Infrastructures, Services and Applications > Cryptographic Protocols > 67-82
Lecture Notes in Computer Science > Computer Security – ESORICS 2010 > Cryptographic Protocols > 151-167
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Universal Composability > 449-467
computational complexity > 2016 > 25 > 3 > 567-605
2011 IEEE Symposium on Security and Privacy > 490 - 505