-
1341
-
1342Published 2010Table of Contents: “…: the Computationally-Bounded and Noisy Cases -- 2-Party Protocols -- Partial Fairness in Secure Two-Party Computation…”
Full Text via HEAL-Link
Electronic eBook -
1343
-
1344
-
1345
-
1346
-
1347
-
1348Published 2010Table of Contents: “… and Their Applications -- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries -- Linear…”
Full Text via HEAL-Link
Electronic eBook -
1349
-
1350Published 2010Table of Contents: “… and Pervasive Computing -- Security Enhancement and Modular Treatment towards Authenticated Key Exchange…”
Full Text via HEAL-Link
Electronic eBook -
1351
-
1352
-
1353Published 2007Table of Contents: “… -- New Paradigm of Inference Control with Trusted Computing -- Security Patterns for Physical Access…”
Full Text via HEAL-Link
Electronic eBook -
1354
-
1355
-
1356
-
1357
-
1358
-
1359
-
1360