Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite

Linked e-resources

Details

Secure computation: primitives and new models
Public key cryptographic primitives
Secure computation II: applications
Anonymity and related applications
Cryptanalysis and attacks (symmetric crypto)
Privacy and policy enforcement
Authentication via eye tracking and proofs of proximity
Malware analysis and side channel attacks
Side channel countermeasures and tamper resistance/PUFs
Leakage resilience and pseudorandomness.

Browse Subjects

Show more subjects...

Statistics

from
to
Export