Showing 21 - 40 results of 241 for search '"cryptographic protocol"', query time: 0.09s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
    Published 2014
    Table of Contents: “…Cryptanalysis -- Cryptographic protocols -- Fine-grain cryptographic protocols -- Key exchange…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 25
    Published 2012
    Table of Contents: “…Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory.…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 26
    Published 2017
    Table of Contents: “…Cryptographic Protocols -- Foundations -- Zero-Knowledge Proofs -- Symmetric Key Designs.…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 27
    Published 2016
    Table of Contents: “…Secret sharing -- Quantum cryptography -- Visual cryptography -- Cryptographic protocols.-Entropy…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 28
    Table of Contents: “…and Overview -- Finite Field Arithmetic -- Elliptic Curve Arithmetic -- Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 29
    Published 2017
    Table of Contents: “… -- Cryptographic protocols.…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 30
    Published 2013
    Table of Contents: “…Attack and defense -- Software and Web security -- Cryptanalysis -- Cryptographic protocol…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 31
    Published 2012
    Table of Contents: “… -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 32
    Published 2018
    Table of Contents: “… -- Signatures -- Cryptanalysis -- Cryptographic primitives -- Cryptographic protocols.…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 33
    Published 2016
    Table of Contents: “…Cryptanalysis -- Cryptographic Protocols -- Network and Systems Security and Access Control…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 34
    Published 2017
    Table of Contents: “…Network security -- Threat analysis -- Application security -- Cryptographic protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 35
    Published 2016
    Table of Contents: “… -- Cryptographic Protocol -- Multi-Party Computation.…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 36
    Published 2016
    Table of Contents: “… -- Cryptographic Protocol -- Multi-Party Computation.…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 37
  18. 38
    Published 2016
    Table of Contents: “…Public-Key Cryptography -- Cryptographic Protocols -- Side-Channel Attacks -- Implementation…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 39
    Published 2005
    Table of Contents: “…Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 40
    Published 2003
    Table of Contents: “… -- What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search