Find link

Find link is a tool written by Edward Betts.

searching for Applied Cryptography and Network Security 8 found (10 total)

alternate case: applied Cryptography and Network Security

Matthew D. Green (771 words) [view diff] case mismatch in snippet view article find links to article

Matthew Daniel Green (born 1976) is an expert in applied cryptography and network security. Green specializes in applied cryptography, privacy-enhanced
Jonathan Katz (computer scientist) (631 words) [view diff] exact match in snippet view article
book is held in 348 libraries Coeditor with Moti Yung of Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China
Data in Use (652 words) [view diff] case mismatch in snippet view article find links to article
"Proceedings of the 11th international conference on applied cryptography and network security", 2013 M. Henson and S. Taylor "Memory encryption: a
David Chaum (2,089 words) [view diff] exact match in snippet view article find links to article
Remote Voting System," 11th International Conference on Applied Cryptography and Network Security (ACNS 2013). Declan McCullagh, "High hopes for unscrambling
Markus Jakobsson (1,067 words) [view diff] exact match in snippet view article find links to article
Deriving Mother’s Maiden Names Using Public Records" (PDF). Applied Cryptography and Network Security. New York, NY. Retrieved 2013-04-02.  M. Gandhi, M. Jakobsson
Cold boot attack (2,276 words) [view diff] case mismatch in snippet view article find links to article
"Proceedings of the 11th international conference on applied cryptography and network security", 2013 M. Henson and S. Taylor "Memory encryption: a
Proxy re-encryption (674 words) [view diff] exact match in snippet view article find links to article
Green, G. Ateniese. Identity-Based Proxy Re-encryption. Applied Cryptography and Network Security Conference, June 2007. S. Hohenberger, G. Rothblum, a
Merkle signature scheme (717 words) [view diff] exact match in snippet view article find links to article
signature capacity". 5th International Conference on Applied Cryptography and Network Security - ACNS07, 2007. Ralph Merkle. "Secrecy, authentication