Find link

Find link is a tool written by Edward Betts.

searching for Applied Cryptography and Network Security 9 found (11 total)

alternate case: applied Cryptography and Network Security

Jonathan Katz (computer scientist) (650 words) [view diff] exact match in snippet view article

book is held in 348 libraries Coeditor with Moti Yung of Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China
Algebraic Eraser (1,531 words) [view diff] exact match in snippet view article find links to article
authors parameter (link) International Conference on Applied Cryptography and Network Security 2016. Volume 9696 of the series Lecture Notes in Computer
Data in use (661 words) [view diff] case mismatch in snippet view article find links to article
"Proceedings of the 11th international conference on applied cryptography and network security", 2013 M. Henson and S. Taylor "Memory encryption: a
Markus Jakobsson (1,051 words) [view diff] exact match in snippet view article find links to article
Deriving Mother’s Maiden Names Using Public Records" (PDF). Applied Cryptography and Network Security. New York, NY. Retrieved 2013-04-02.  M. Gandhi; M. Jakobsson
David Chaum (2,219 words) [view diff] exact match in snippet view article find links to article
Remote Voting System," 11th International Conference on Applied Cryptography and Network Security (ACNS 2013). Declan McCullagh, "High hopes for unscrambling
Cold boot attack (2,952 words) [view diff] case mismatch in snippet view article find links to article
"Proceedings of the 11th international conference on applied cryptography and network security", 2013 M. Henson and S. Taylor "Memory encryption: a
Proxy re-encryption (674 words) [view diff] exact match in snippet view article find links to article
Green, G. Ateniese. Identity-Based Proxy Re-encryption. Applied Cryptography and Network Security Conference, June 2007. S. Hohenberger, G. Rothblum, a
Merkle signature scheme (1,446 words) [view diff] exact match in snippet view article find links to article
signature capacity". 5th International Conference on Applied Cryptography and Network Security - ACNS07, 2007. Ralph Merkle. "Secrecy, authentication
Right to be forgotten (8,963 words) [view diff] exact match in snippet view article find links to article
Online Information." The 13th International Conference on Applied Cryptography and Network Security (ACNS 2015). Gallo Sallent, Juan Antonio; "El Derecho