Erscheinungsjahr
Datenquelle
Sprache
Synonyme wurden verwendet für: Datensicherheit
Suche ohne Synonyme: keywords:(Datensicherheit)
Verwendete Synonyme:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
1–20 von 95 Ergebnissen
Sortieren:
Sortieren:
-
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
Freier ZugriffSpringer Verlag | 2013|Schlagwörter: Systems and Data Security -
Black-Box Reusable NISC with Random Oracles
Springer Verlag | 2023|Schlagwörter: Systems and Data Security -
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
Freier ZugriffSpringer Verlag | 2015|Schlagwörter: Systems and Data Security -
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
Freier ZugriffSpringer Verlag | 2013|Schlagwörter: Systems and Data Security -
Multi-input Functional Encryption
Freier ZugriffSpringer Verlag | 2014|Schlagwörter: Systems and Data Security -
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$i\mathcal {O}$$\end{document}
Springer Verlag | 2023|Schlagwörter: Systems and Data Security -
Combiners for Functional Encryption, Unconditionally
Springer Verlag | 2020|Schlagwörter: Systems and Data Security -
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
Freier ZugriffSpringer Verlag | 2014|Schlagwörter: Systems and Data Security -
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions
Springer Verlag | 2017|Schlagwörter: Systems and Data Security -
Protecting Obfuscation against Algebraic Attacks
Freier ZugriffSpringer Verlag | 2014|Schlagwörter: Systems and Data Security -
Exploring Crypto Dark Matter:
New Simple PRF Candidates and Their ApplicationsSpringer Verlag | 2018|Schlagwörter: Systems and Data Security -
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
Springer Verlag | 2016|Schlagwörter: Systems and Data Security -
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
Freier ZugriffSpringer Verlag | 2015|Schlagwörter: Systems and Data Security -
Patchable Indistinguishability Obfuscation: \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$i\mathcal {O}$$\end{document} for Evolving Software
Springer Verlag | 2017|Schlagwörter: Systems and Data Security -
Round Optimal Concurrent MPC via Strong Simulation
Springer Verlag | 2017|Schlagwörter: Systems and Data Security -
Non-Interactive Multiparty Computation Without Correlated Randomness
Springer Verlag | 2017|Schlagwörter: Systems and Data Security -
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification
Springer Verlag | 2021|Schlagwörter: Systems and Data Security