Showing 21 - 40 results of 59 for search '"functional encryption"', query time: 0.21s Refine Results
  1. 21
    Published 2018
    Table of Contents: “… and functional encryption -- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 22
    Published 2016
    Table of Contents: “… Security -- Functional Encryption and Attribute-Based Cryptosystem.…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 23
    Published 2019
    Table of Contents: “… -- Fundamental Primitives -- Public Key Encryptions -- Functional Encryption.-Obfuscation Based Cryptography…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 24
    Published 2019
    Table of Contents: “… -- Fundamental Primitives -- Public Key Encryptions -- Functional Encryption.-Obfuscation Based Cryptography…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 25
    Published 2019
    Table of Contents: “… -- Functional Encryption -- Zero Knowledge.…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 26
    Published 2018
    Table of Contents: “… Signatures -- Functional Encryption -- Foundations -- Obfuscation-Based Cryptographic Constructions…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 27
    Published 2019
    Table of Contents: “… -- Functional Encryption -- Zero Knowledge.…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 28
    Published 2019
    Table of Contents: “… -- Functional Encryption -- Zero Knowledge.…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 29
    Published 2018
    Table of Contents: “… Signatures -- Functional Encryption -- Foundations -- Obfuscation-Based Cryptographic Constructions…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 30
    Published 2016
    Table of Contents: “… and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 31
    Table of Contents: “… Functional Encryption and Functional Signatures -- Verifiable Computing for Specific Applications -- Analysis…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40
Search Tools: RSS Feed Email Search