Personensuche
X
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
1
Compact Ring Signatures with Post-Quantum Security in Stand..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
2
Compact Accountable Ring Signatures in the Plain Model:
, In:
?
Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science ,
3
Logarithmic-Size (Linkable) Ring Signatures from Lattice Is..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
4
Spherical Gaussian Leftover Hash Lemma via the Rényi Diverg..:
, In:
?
Computational Linguistics and Intelligent Text Processing; Lecture Notes in Computer Science ,
5
Detecting Machine-Translated Paragraphs by Matching Similar..:
, In:
?
Communications in Computer and Information Science; Computer Vision, Imaging and Computer Graphics Theory and Applications ,
7
Influence of Errors on the Evaluation of Text Classificatio..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022 ,
9
Trapdoor Sanitizable and Redactable Signatures with Unlinka..:
, In:
?
Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography ,
10
GPU Acceleration of High-Precision Homomorphic Computation ..:
, In:
?
2022 IEEE 28th International Conference on Engineering, Technology and Innovation (ICE/ITMC) & 31st International Association For Management of Technology (IAMOT) Joint Conference ,
11
Security Inspection Framework and its Application to Use Ca..:
, In:
?
Provable and Practical Security; Lecture Notes in Computer Science ,
14
Zero-Knowledge Range Arguments for Signed Fractional Number..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
15