Linked e-resources

Details

Applied Cryptography
An Aggregate Signature with Pre-Communication in the Plain Public Key Model
The Adversary Capabilities In Practical Byzantine Fault Tolerance
Privacy
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services
Efficient permutation protocol for MPC in the head
Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF 78
Formal Methods for Security and Trust
Secure Implementation of a Quantum-Future GAKE Protocol
Deciding a Fragment of (alpha, beta)-Privacy
Systems Security
TLS beyond the broker: Enforcing ne-grained security and trust in publish/subscribe environments for IoT
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols
Towards Decentralized and Provably Secure Cross-Domain Solutions.

Browse Subjects

Show more subjects...

Statistics

from
to
Export