Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • 2016-03-23 Paper Security Against Related Randomness Attacks via Reconstructive Extractors 2016-01-12 Paper Data Is a Stream: Security of Stream-Based Channels...
    10 bytes (18 words) - 18:26, 11 December 2023
  • 2006-10-05 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Cryptology - ICISC...
    10 bytes (20 words) - 22:08, 10 December 2023
  • Unbounded HIBE with tight security 2023-03-21 Paper Hierarchical Identity-Based Encryption with Tight Multi-challenge Security 2022-10-13 Paper Signed (group)...
    10 bytes (17 words) - 19:28, 11 December 2023
  • optimal tightness 2020-03-09 Paper Model Checking Security Protocols 2018-07-20 Paper Strengthening the security of authenticated key exchange against bad randomness...
    10 bytes (21 words) - 03:58, 12 December 2023
  • Long-run effects of unfunded social security with earnings-dependent benefits 2008-10-24 Paper Comparing social security programs with leisure and bequests...
    10 bytes (17 words) - 13:24, 28 January 2024
  • analysis 2011-06-22 Paper Growth–Security Models and Stochastic Dominance 2011-05-31 Paper Capital growth with security 2008-10-24 Paper Time to wealth...
    10 bytes (18 words) - 01:55, 12 December 2023
  • 2005-12-22 Paper Information Security and Privacy 2005-09-07 Paper Information Security and Privacy 2005-09-07 Paper Information Security and Privacy 2005-09-07...
    10 bytes (16 words) - 22:41, 10 December 2023
  • Publication Type Security of Tseng-Jan's group signature schemes 2016-06-16 Paper Information Security and Privacy 2006-06-22 Paper Information Security and Cryptology...
    10 bytes (18 words) - 22:08, 10 December 2023
  • Paper Information Security 2006-10-20 Paper Information Security 2006-10-16 Paper Theory of Cryptography 2005-12-07 Paper On the security of two public key...
    10 bytes (16 words) - 23:46, 10 December 2023
  • Publication Date of Publication Type Disseminating security updates at internet scale 2004-01-11 Paper A conceptual framework for network and client adaptation...
    10 bytes (18 words) - 10:26, 9 December 2023
  • Save on Bandwidth and Computation Without Sacrificing Security 2008-12-21 Paper On the Security of OAEP 2008-04-24 Paper Analysis of Random Oracle Instantiation...
    10 bytes (16 words) - 22:21, 11 December 2023
  • scheme 2015-04-29 Paper Security weaknesses in arbitrated quantum signature protocols 2014-04-08 Paper Improving the security of arbitrated quantum signature...
    10 bytes (17 words) - 00:33, 10 December 2023
  • Paper Security of Truncated MACs 2009-04-29 Paper On the Unprovable Security of 2-Key XCBC 2008-07-08 Paper Symmetric Nonce Respecting Security Model and...
    10 bytes (17 words) - 13:34, 11 December 2023
  • mardi4nfdi.de/entity/Q2765463 2002-08-05 Paper Security in cyberspace: A knowledge-base approach 1998-07-22 Paper Security in cyberspace: A knowledge-base approach...
    10 bytes (16 words) - 20:11, 12 December 2023
  • Information Security and Cryptology - ICISC 2003 2005-12-27 Paper Information Security and Cryptology - ICISC 2003 2005-12-27 Paper Information Security and Cryptology...
    10 bytes (17 words) - 19:22, 9 December 2023
  • 2016-10-27 Paper On the Hardness of Proving CCA-Security of Signed ElGamal 2016-04-13 Paper Data Is a Stream: Security of Stream-Based Channels 2015-12-10 Paper...
    10 bytes (16 words) - 18:01, 9 December 2023
  • Paper On the worst-case side-channel security of ECC point randomization in embedded devices 2022-07-06 Paper Security analysis of deterministic re-keying...
    10 bytes (19 words) - 18:49, 11 December 2023
  • graphs 2024-02-09 Paper Synchronization in security games 2023-08-16 Paper Disappointment-aversion in security games 2023-08-02 Paper Games over probability...
    10 bytes (16 words) - 22:14, 12 December 2023
  • Cryptography and Data Security 2005-12-22 Paper Information and Communications Security 2005-08-19 Paper Applied Cryptography and Network Security 2005-06-13 Paper...
    10 bytes (21 words) - 02:49, 13 December 2023
  • Cryptography and Network Security 2007-05-02 Paper Information Security and Cryptology - ICISC 2005 2007-05-02 Paper Security extension for the Canetti-Krawczyk...
    10 bytes (16 words) - 18:07, 9 December 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)