Search results
Cryptography and Communications > 2018 > 10 > 1 > 41-58
Designs, Codes and Cryptography > 2018 > 86 > 3 > 481-516
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Communications Infrastructure. Systems and Applications in Europe > Intelligent Healthcare Systems (IHS) > 217-228
IEEE Security & Privacy > 2016 > 14 > 3 > 14 - 21
Lecture Notes in Computer Science > Information Hiding > Steganalysis > 195-208
Lecture Notes in Computer Science > Information Security Applications > Public Key Crypto Applications > 99-114
IFIP — The International Federation for Information Processing > Security and Protection in Information Processing Systems > 29-45
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2009 > Asymmetric Encryption and Anonymity > 179-197
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Regular Papers > 51-63
Lecture Notes in Computer Science > Computer Security - ESORICS 2000 > Security Property Analysis > 238-254
Lecture Notes in Computer Science > Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems > Smart Card > 161-174
Lecture Notes in Computer Science > Trusted Computing - Challenges and Applications > TRUST 2008 > 1-13