Personensuche
X
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
1
Compact Ring Signatures with Post-Quantum Security in Stand..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
2
Compact Accountable Ring Signatures in the Plain Model:
, In:
?
Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science ,
3
Logarithmic-Size (Linkable) Ring Signatures from Lattice Is..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
4
Spherical Gaussian Leftover Hash Lemma via the Rényi Diverg..:
, In:
?
Computational Linguistics and Intelligent Text Processing; Lecture Notes in Computer Science ,
5
Detecting Machine-Translated Paragraphs by Matching Similar..:
, In:
?
Communications in Computer and Information Science; Computer Vision, Imaging and Computer Graphics Theory and Applications ,
6
Influence of Errors on the Evaluation of Text Classificatio..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022 ,
7
Trapdoor Sanitizable and Redactable Signatures with Unlinka..:
, In:
?
Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography ,
8
GPU Acceleration of High-Precision Homomorphic Computation ..:
, In:
?
2022 IEEE 28th International Conference on Engineering, Technology and Innovation (ICE/ITMC) & 31st International Association For Management of Technology (IAMOT) Joint Conference ,
9
Security Inspection Framework and its Application to Use Ca..:
, In:
?
Provable and Practical Security; Lecture Notes in Computer Science ,
10
Zero-Knowledge Range Arguments for Signed Fractional Number..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
11
Efficient Unique Ring Signatures from Lattices:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
12
Hierarchical Identity-based Puncturable Encryption from Lat..:
, In:
?
Communications in Computer and Information Science; Information Systems Security and Privacy ,
13
Effects of Explanatory Information on Privacy Policy Summar..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
14
Efficient Unique Ring Signature for Blockchain Privacy Prot..:
, In:
?
Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science ,
15