Search results
From MaRDI portal
- 2016-03-23 Paper Security Against Related Randomness Attacks via Reconstructive Extractors 2016-01-12 Paper Data Is a Stream: Security of Stream-Based Channels...10 bytes (18 words) - 18:26, 11 December 2023
- 2006-10-05 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Cryptology - ICISC...10 bytes (20 words) - 22:08, 10 December 2023
- Unbounded HIBE with tight security 2023-03-21 Paper Hierarchical Identity-Based Encryption with Tight Multi-challenge Security 2022-10-13 Paper Signed (group)...10 bytes (17 words) - 19:28, 11 December 2023
- optimal tightness 2020-03-09 Paper Model Checking Security Protocols 2018-07-20 Paper Strengthening the security of authenticated key exchange against bad randomness...10 bytes (21 words) - 03:58, 12 December 2023
- Long-run effects of unfunded social security with earnings-dependent benefits 2008-10-24 Paper Comparing social security programs with leisure and bequests...10 bytes (17 words) - 13:24, 28 January 2024
- analysis 2011-06-22 Paper Growth–Security Models and Stochastic Dominance 2011-05-31 Paper Capital growth with security 2008-10-24 Paper Time to wealth...10 bytes (18 words) - 01:55, 12 December 2023
- 2005-12-22 Paper Information Security and Privacy 2005-09-07 Paper Information Security and Privacy 2005-09-07 Paper Information Security and Privacy 2005-09-07...10 bytes (16 words) - 22:41, 10 December 2023
- Publication Type Security of Tseng-Jan's group signature schemes 2016-06-16 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Cryptology...10 bytes (18 words) - 22:08, 10 December 2023
- Paper Information Security 2006-10-20 Paper Information Security 2006-10-16 Paper Theory of Cryptography 2005-12-07 Paper On the security of two public key...10 bytes (16 words) - 23:46, 10 December 2023
- Publication Date of Publication Type Disseminating security updates at internet scale 2004-01-11 Paper A conceptual framework for network and client adaptation...10 bytes (18 words) - 10:26, 9 December 2023
- Save on Bandwidth and Computation Without Sacrificing Security 2008-12-21 Paper On the Security of OAEP 2008-04-24 Paper Analysis of Random Oracle Instantiation...10 bytes (16 words) - 22:21, 11 December 2023
- scheme 2015-04-29 Paper Security weaknesses in arbitrated quantum signature protocols 2014-04-08 Paper Improving the security of arbitrated quantum signature...10 bytes (17 words) - 00:33, 10 December 2023
- Paper Security of Truncated MACs 2009-04-29 Paper On the Unprovable Security of 2-Key XCBC 2008-07-08 Paper Symmetric Nonce Respecting Security Model and...10 bytes (17 words) - 13:34, 11 December 2023
- mardi4nfdi.de/entity/Q2765463 2002-08-05 Paper Security in cyberspace: A knowledge-base approach 1998-07-22 Paper Security in cyberspace: A knowledge-base approach...10 bytes (16 words) - 20:11, 12 December 2023
- Information Security and Cryptology - ICISC 2003 2005-12-27 Paper Information Security and Cryptology - ICISC 2003 2005-12-27 Paper Information Security and Cryptology...10 bytes (17 words) - 19:22, 9 December 2023
- 2016-10-27 Paper On the Hardness of Proving CCA-Security of Signed ElGamal 2016-04-13 Paper Data Is a Stream: Security of Stream-Based Channels 2015-12-10 Paper...10 bytes (16 words) - 18:01, 9 December 2023
- Paper On the worst-case side-channel security of ECC point randomization in embedded devices 2022-07-06 Paper Security analysis of deterministic re-keying...10 bytes (19 words) - 18:49, 11 December 2023
- graphs 2024-02-09 Paper Synchronization in security games 2023-08-16 Paper Disappointment-aversion in security games 2023-08-02 Paper Games over probability...10 bytes (16 words) - 22:14, 12 December 2023
- Cryptography and Data Security 2005-12-22 Paper Information and Communications Security 2005-08-19 Paper Applied Cryptography and Network Security 2005-06-13 Paper...10 bytes (21 words) - 02:49, 13 December 2023
- Cryptography and Network Security 2007-05-02 Paper Information Security and Cryptology - ICISC 2005 2007-05-02 Paper Security extension for the Canetti-Krawczyk...10 bytes (16 words) - 18:07, 9 December 2023