Search results
From MaRDI portal
- 2006-10-05 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Cryptology...10 bytes (20 words) - 22:08, 10 December 2023
- Publication Type Security of Tseng-Jan's group signature schemes 2016-06-16 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Cryptology...10 bytes (18 words) - 22:08, 10 December 2023
- Publication Type Information Security 2006-10-16 Paper Information Security and Cryptology - ICISC 2003 2005-12-27 Paper Information Security Practice and...10 bytes (16 words) - 15:07, 24 September 2023
- 2008-03-17 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Cryptology - ICISC 2003 2005-12-27 Paper Information Security and Privacy...10 bytes (18 words) - 03:20, 28 December 2023
- 2007-06-08 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Privacy 2005-09-07...10 bytes (16 words) - 13:47, 6 October 2023
- Publication Type Information Security 2006-10-16 Paper Information Security and Cryptology - ICISC 2003 2005-12-27 Paper Information Security and Privacy 2005-09-07...10 bytes (16 words) - 08:52, 6 October 2023
- multi-signature schemes 2007-03-02 Paper Information and Communications Security 2006-10-24 Paper Information Security 2006-10-16 Paper https://portal.mardi4nfdi...10 bytes (16 words) - 10:12, 6 October 2023
- 2009-05-07 Paper Information and Communications Security 2006-10-24 Paper Information Security 2006-10-16 Paper Information Security 2006-10-16 Paper https://portal...10 bytes (18 words) - 06:12, 7 October 2023
- Dynamic Broadcast Encryption 2009-01-09 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Privacy 2005-09-07 Paper A Revocation...10 bytes (16 words) - 02:59, 28 December 2023
- Cryptology and Network Security 2006-11-14 Paper Information Security and Cryptology - ICISC 2003 2005-12-27 Paper Information Security Practice and Experience...10 bytes (16 words) - 15:36, 6 October 2023
- Communications Security 2006-10-24 Paper Information Security 2006-10-16 Paper Information Security 2006-10-16 Paper https://portal.mardi4nfdi.de/entity/Q4473592...10 bytes (16 words) - 09:10, 24 September 2023
- 2007-05-02 Paper Information Security 2006-10-16 Paper Information Security and Cryptology - ICISC 2003 2005-12-27 Paper Information Security and Cryptology...10 bytes (16 words) - 06:46, 7 October 2023
- manufacturers 2024-02-05 Paper A game of information security investment considering security insurance and complementary information assets 2023-11-27 Paper A novel...10 bytes (16 words) - 18:54, 24 September 2023
- Fundamentals of Computation Theory 2006-10-20 Paper Information Security 2006-10-20 Paper Information Security and Cryptology - ICISC 2003 2005-12-27 Paper https://portal...10 bytes (17 words) - 11:15, 24 September 2023
- Paper Information and Communications Security 2006-10-24 Paper Information Security and Cryptology - ICISC 2003 2005-12-27 Paper Information Security and...10 bytes (16 words) - 09:50, 6 October 2023
- Paper Information and Communications Security 2006-10-24 Paper Information Security 2006-10-20 Paper Information Security 2006-10-20 Paper Topics in Cryptology...10 bytes (18 words) - 16:48, 24 September 2023
- Publication Type Information Security 2006-10-20 Paper Information and Communications Security 2005-08-19 Paper Information and Communications Security 2005-08-19...10 bytes (16 words) - 21:07, 26 December 2023
- 2007-02-12 Paper Information Security and Cryptology 2006-11-14 Paper Information and Communications Security 2006-10-24 Paper Information and Communications...10 bytes (16 words) - 16:36, 6 October 2023
- Cryptography and Network Security 2008-02-19 Paper Information Security and Cryptology 2006-11-14 Paper Information and Communications Security 2006-10-24 Paper...10 bytes (16 words) - 13:01, 7 October 2023
- Foundations of Security Analysis and Design II 2009-05-14 Paper Foundations of Security Analysis and Design II 2009-05-14 Paper Information flow security in boundary...10 bytes (17 words) - 13:56, 6 October 2023