-
21Published 2018Table of Contents: “… and functional encryption -- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled…”
Full Text via HEAL-Link
Electronic eBook -
22Published 2016Table of Contents: “… Security -- Functional Encryption and Attribute-Based Cryptosystem.…”
Full Text via HEAL-Link
Electronic eBook -
23Published 2019Table of Contents: “… -- Fundamental Primitives -- Public Key Encryptions -- Functional Encryption.-Obfuscation Based Cryptography…”
Full Text via HEAL-Link
Electronic eBook -
24Published 2019Table of Contents: “… -- Fundamental Primitives -- Public Key Encryptions -- Functional Encryption.-Obfuscation Based Cryptography…”
Full Text via HEAL-Link
Electronic eBook -
25Published 2019Table of Contents: “… -- Functional Encryption -- Zero Knowledge.…”
Full Text via HEAL-Link
Electronic eBook -
26Published 2018Table of Contents: “… Signatures -- Functional Encryption -- Foundations -- Obfuscation-Based Cryptographic Constructions…”
Full Text via HEAL-Link
Electronic eBook -
27Published 2019Table of Contents: “… -- Functional Encryption -- Zero Knowledge.…”
Full Text via HEAL-Link
Electronic eBook -
28Published 2019Table of Contents: “… -- Functional Encryption -- Zero Knowledge.…”
Full Text via HEAL-Link
Electronic eBook -
29Published 2018Table of Contents: “… Signatures -- Functional Encryption -- Foundations -- Obfuscation-Based Cryptographic Constructions…”
Full Text via HEAL-Link
Electronic eBook -
30Published 2016Table of Contents: “… and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non…”
Full Text via HEAL-Link
Electronic eBook -
31Table of Contents: “… Functional Encryption and Functional Signatures -- Verifiable Computing for Specific Applications -- Analysis…”
Full Text via HEAL-Link
Electronic eBook -
32
-
33
-
34
-
35
-
36
-
37
-
38
-
39
-
40