Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 39 results in range #1 to #39.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Information-Theoretic Foundations of Differential Privacy: Label: en
  2. Scalable Deniable Group Key Establishment: Label: en
  3. Towards Modelling Adaptive Attacker’s Behaviour: Label: en
  4. QoS Aware Adaptive Security Scheme for Video Streaming in MANETs: Label: en
  5. On Securely Manipulating XML Data: Label: en
  6. Short-Term Linkable Group Signatures with Categorized Batch Verification: Label: en
  7. A Novel Obfuscation: Class Hierarchy Flattening: Label: en
  8. Policy Administration in Tag-Based Authorization: Label: en
  9. IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability: Label: en
  10. A Formal Derivation of Composite Trust: Label: en
  11. COMPASS: Authenticated Group Key Agreement from Signcryption: Label: en
  12. Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities: Label: en
  13. A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes: Label: en
  14. Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements: Label: en
  15. MARC: Modified ARC4: Label: en
  16. Proofs of Retrievability via Fountain Code: Label: en
  17. MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption: Label: en
  18. ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage: Label: en
  19. Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy: Label: en
  20. Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress: Label: en
  21. A Metamodel of the B Modeling of Access-Control Policies: Work in Progress: Label: en
  22. Specification and Verification of Access Control Policies in EB3SEC: Work in Progress: Label: en
  23. A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress: Label: en
  24. A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress: Label: en
  25. Phishing Detection with Popular Search Engines: Simple and Effective: Label: en
  26. Black-Box Property of Cryptographic Hash Functions: Label: en
  27. Vote-Independence: A Powerful Privacy Notion for Voting Protocols: Label: en
  28. Formal Specification and Validation of Security Policies: Label: en
  29. Secret Key Establishment over Noisy Channels: Label: en
  30. Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol: Label: en
  31. A Computational Indistinguishability Logic for the Bounded Storage Model: Label: en
  32. A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules: Label: en
  33. A Novel Commutative Blinding Identity Based Encryption Scheme: Label: en
  34. Threshold Encryption into Multiple Ciphertexts: Label: en
  35. Private Identification of RFID Tags: Label: en
  36. SC 2: Secure Communication over Smart Cards: Label: en
  37. Automated Verification of Block Cipher Modes of Operation, an Improved Method: Label: en
  38. TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections: Label: en
  39. Preserving Privacy in Online Social Networks: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)