Personensuche
X
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
1
Compact Accountable Ring Signatures in the Plain Model:
, In:
?
Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science ,
2
Logarithmic-Size (Linkable) Ring Signatures from Lattice Is..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
3
Compact Ring Signatures with Post-Quantum Security in Stand..:
, In:
?
Communications in Computer and Information Science; Computer Vision, Imaging and Computer Graphics Theory and Applications ,
4
Influence of Errors on the Evaluation of Text Classificatio..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022 ,
6
Trapdoor Sanitizable and Redactable Signatures with Unlinka..:
, In:
?
Computational Linguistics and Intelligent Text Processing; Lecture Notes in Computer Science ,
7
Detecting Machine-Translated Paragraphs by Matching Similar..:
, In:
?
Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography ,
8
GPU Acceleration of High-Precision Homomorphic Computation ..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
9
Spherical Gaussian Leftover Hash Lemma via the Rényi Diverg..:
, In:
?
2022 IEEE 28th International Conference on Engineering, Technology and Innovation (ICE/ITMC) & 31st International Association For Management of Technology (IAMOT) Joint Conference ,
12
Security Inspection Framework and its Application to Use Ca..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
13
Hierarchical Identity-based Puncturable Encryption from Lat..:
, In:
?
Communications in Computer and Information Science; Information Systems Security and Privacy ,
15