Search results
Signal Processing > 2015 > 111 > Complete > 150-164
Designs, Codes and Cryptography > 2018 > 86 > 4 > 785-802
Algorithmica > 2017 > 79 > 4 > 1318-1352
Algorithmica > 2017 > 79 > 4 > 1233-1285
Lecture Notes in Computer Science > Information Security Practice and Experience > Multimedia Security and DRM > 147-158
Journal of Visual Communication and Image Representation > 2016 > 40 > PA > 1-13
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Web Security > 217-227
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 8: Broadcast Encryption > 359-376
Lecture Notes in Computer Science > Information Security Practice and Experience > Signature, Secrete Sharing and Traitor Tracing > 302-316
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Block Ciphers > 331-346
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > 215-224
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptographic Protocols > 369-382
Lecture Notes in Computer Science > Information and Communications Security > Public Key Cryptography > 121-134
Lecture Notes in Computer Science > Information and Communications Security > Fingerprinting & Watermarking > 197-208