Personensuche
X
?
Information Systems Security; Lecture Notes in Computer Science ,
1
Faster Private Rating Update via Integer-Based Homomorphic ..:
, In:
?
Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science ,
3
HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compli..:
, In:
?
Protocols for Authentication and Key Establishment; Information Security and Cryptography ,
4
Authentication and Key Transport Using Public Key Cryptogra..:
, In:
?
Information Systems Security; Lecture Notes in Computer Science ,
5
Item-Based Privacy-Preserving Recommender System with Offli..:
, In:
?
Protocols for Authentication and Key Establishment; Information Security and Cryptography ,
6
Key Agreement Protocols:
, In:
?
Protocols for Authentication and Key Establishment; Information Security and Cryptography ,
7
Transport Layer Security Protocol:
, In:
?
Protocols for Authentication and Key Establishment; Information Security and Cryptography ,
9
Computational Security Models:
, In:
?
Protocols for Authentication and Key Establishment; Information Security and Cryptography ,
10
Group Key Establishment:
, In:
?
Protocols for Authentication and Key Establishment; Information Security and Cryptography ,
11
Identity-Based Key Agreement:
, In:
?
Protocols for Authentication and Key Establishment; Information Security and Cryptography ,
12
Protocols Using Shared Key Cryptography:
, In:
?
Protocols for Authentication and Key Establishment; Information Security and Cryptography ,
13
Introduction to Authentication and Key Establishment:
, In:
?
Communications in Computer and Information Science; Security and Privacy ,
14
An Enhanced Privacy-Preserving Recommender System:
, In:
?
Protocols for Authentication and Key Establishment; Information Security and Cryptography ,
15