Find link

Find link is a tool written by Edward Betts.

searching for Applied Cryptography and Network Security 8 found (10 total)

alternate case: applied Cryptography and Network Security

Matthew D. Green (680 words) [view diff] case mismatch in snippet view article find links to article

Matthew Daniel Green (born August 1976) is an expert in applied cryptography and network security. He is a graduate of the Johns Hopkins University and
Jonathan Katz (computer scientist) (631 words) [view diff] exact match in snippet view article find links to article
book is held in 348 libraries Coeditor with Moti Yung of Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China
Markus Jakobsson (1,067 words) [view diff] exact match in snippet view article find links to article
Deriving Mother’s Maiden Names Using Public Records" (PDF). Applied Cryptography and Network Security. New York, NY. Retrieved 2013-04-02.  M. Gandhi, M. Jakobsson
David Chaum (2,083 words) [view diff] exact match in snippet view article find links to article
Remote Voting System," 11th International Conference on Applied Cryptography and Network Security (ACNS 2013). Declan McCullagh, "High hopes for unscrambling
Cold boot attack (2,276 words) [view diff] case mismatch in snippet view article find links to article
"Proceedings of the 11th international conference on applied cryptography and network security", 2013 M. Henson and S. Taylor "Memory encryption: a
Data in Use (652 words) [view diff] case mismatch in snippet view article find links to article
"Proceedings of the 11th international conference on applied cryptography and network security", 2013 M. Henson and S. Taylor "Memory encryption: a
Merkle signature scheme (717 words) [view diff] exact match in snippet view article find links to article
signature capacity". 5th International Conference on Applied Cryptography and Network Security - ACNS07, 2007. Ralph Merkle. "Secrecy, authentication
Proxy re-encryption (668 words) [view diff] exact match in snippet view article find links to article
Green, G. Ateniese. Identity-Based Proxy Re-encryption. Applied Cryptography and Network Security Conference, June 2007. S. Hohenberger, G. Rothblum, a