Find link

langauge:

Find link is a tool written by Edward Betts.

searching for Applied Cryptography and Network Security 12 found (15 total)

alternate case: applied Cryptography and Network Security

Jonathan Katz (computer scientist) (676 words) [view diff] exact match in snippet view article

book is held in 348 libraries Coeditor with Moti Yung of Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China
Data in use (665 words) [view diff] case mismatch in snippet view article find links to article
"Proceedings of the 11th international conference on applied cryptography and network security", 2013 M. Henson and S. Taylor "Memory encryption: a
Proxy re-encryption (685 words) [view diff] exact match in snippet view article find links to article
Green, G. Ateniese. Identity-Based Proxy Re-encryption. Applied Cryptography and Network Security Conference, June 2007. S. Hohenberger, G. Rothblum, a
Markus Jakobsson (1,126 words) [view diff] exact match in snippet view article find links to article
Deriving Mother's Maiden Names Using Public Records" (PDF). Applied Cryptography and Network Security. New York, NY. Retrieved 2013-04-02.  M. Gandhi; M. Jakobsson
Algebraic Eraser (1,531 words) [view diff] exact match in snippet view article find links to article
authors parameter (link) International Conference on Applied Cryptography and Network Security 2016. Volume 9696 of the series Lecture Notes in Computer
David Chaum (2,251 words) [view diff] exact match in snippet view article find links to article
Remote Voting System," 11th International Conference on Applied Cryptography and Network Security (ACNS 2013). Declan McCullagh, "High hopes for unscrambling
Cold boot attack (2,910 words) [view diff] case mismatch in snippet view article find links to article
"Proceedings of the 11th international conference on applied cryptography and network security", 2013 M. Henson and S. Taylor "Memory encryption: a
Hash-based cryptography (1,775 words) [view diff] exact match in snippet view article find links to article
Computer Science. Springer, Berlin, Heidelberg. 4521 (Applied Cryptography and Network Security): 31–45. doi:10.1007/978-3-540-72738-5_3.  Hülsing, Andreas;
Merkle signature scheme (1,449 words) [view diff] exact match in snippet view article find links to article
signature capacity". 5th International Conference on Applied Cryptography and Network Security - ACNS07, 2007. Ralph Merkle. "Secrecy, authentication
Yao's Millionaires' Problem (1,918 words) [view diff] exact match in snippet view article find links to article
Millionaires' Problem Based on Homomorphic Encryption". Applied Cryptography and Network Security. Lecture Notes in Computer Science. Springer, Berlin,
Right to be forgotten (10,996 words) [view diff] exact match in snippet view article find links to article
Online Information." The 13th International Conference on Applied Cryptography and Network Security (ACNS 2015). Gallo Sallent, Juan Antonio; "El Derecho
Group testing (8,462 words) [view diff] exact match in snippet view article find links to article
June 2005). "Indexing information for data forensics". Applied Cryptography and Network Security. Springer Berlin Heidelberg: 206–221. doi:10.1007/11496137_15