The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
<
Volume 23,
Issue 2
Volume 23,
Issue 1
Volume 22,
Issue 6
Volume 22,
Issue 5
Volume 22,
Issue 4
Volume 22,
Issue 3
Volume 22,
Issue 2
Volume 22,
Issue 1
Volume 21,
Issue 6
Volume 21,
Issue 5
Volume 21,
Issue 4
Volume 21,
Issue 3
Volume 21,
Issue 2
Volume 21,
Issue 1
Volume 20,
Issue 6
Volume 20,
Issue 5
Volume 20,
Issue 4
Volume 20,
Issue 3
Volume 20,
Issue 2
Volume 20,
Issue 1
Volume 19,
Issue 6
Volume 19,
Issue 5
Volume 19,
Issue 4
Volume 19,
Issue 3
Volume 19,
Issue 2
Volume 19,
Issue 1
Volume 18,
Issue 6
Volume 18,
Issue 5
Volume 18,
Issue 4
Volume 18,
Issue 3
Volume 18,
Issue 2
Volume 18,
Issue 1
Volume 17,
Issue 6
Volume 17,
Issue 5
Volume 17,
Issue 4
Volume 17,
Issue 3
Volume 17,
Issue 2
Volume 17,
Issue 1
Volume 16,
Issue 6
Volume 16,
Issue 5
Volume 16,
Issue 4
Volume 16,
Issue 3
Volume 16,
Issue 2
Volume 16,
Issue 1
Volume 15,
Issue 6
Volume 15,
Issue 5
Volume 15,
Issue 4
Volume 15,
Issue 3
Volume 15,
Issue 2
Volume 15,
Issue 1
Volume 14,
Issue 6
Volume 14,
Issue 5
Volume 14,
Issue 4
Volume 14,
Issue 3
Volume 14,
Issue 2
Volume 14,
Issue 1
Volume 13,
Issue 6
Volume 13,
Issue 5
Volume 13,
Issue 4
Volume 13,
Issue 3
Volume 13,
Issue 2
Volume 13,
Issue 1
Volume 12,
Issue 6
Volume 12,
Issue 5
Volume 12,
Issue 4
Volume 12,
Issue 3
Volume 12,
Issue 2
Volume 12,
Issue 1
Volume 11,
Issue 6
Volume 11,
Issue 5
Volume 11,
Issue 4
Volume 11,
Issue 3
Volume 11,
Issue 2
Volume 11,
Issue 1
Volume 10,
Issue 6
Volume 10,
Issue 5
Volume 10,
Issue 4
Volume 10,
Issue 3
Volume 10,
Issue 2
Volume 10,
Issue 1
Volume 9,
Issue 6
Volume 9,
Issue 5
Volume 9,
Issue 4
Volume 9,
Issue 3
Volume 9,
Issue 2
Volume 9,
Issue 1
Volume 8,
Issue 6
Volume 8,
Issue 5
Volume 8,
Issue 4
Volume 8,
Issue 3
Volume 8,
Issue 2
Volume 8,
Issue 1
Volume 7,
Issue 6
Volume 7,
Issue 5
Volume 7,
Issue 4
Volume 7,
Issue 3
Volume 7,
Issue 2
Volume 7,
Issue 1
Volume 6,
Issue 6
Volume 6,
Issue 5
Volume 6,
Issue 4
Volume 6,
Issue 3
Volume 6,
Issue 2
Volume 6,
Issue 1
Volume 5,
Issue 4
Volume 5,
Issue 3
Volume 5,
Issue 2
Volume 5,
Issue 1
Volume 4,
Issue 4
Volume 4,
Issue 3
Volume 4,
Issue 2
Volume 4,
Issue 1
Volume 3,
Issue 2
Volume 3,
Issue 1
Volume 2,
Issue 4
Volume 2,
Issue 3
Volume 2,
Issue 2
Volume 2,
Issue 1
Volume 1,
Issue 4
>
Table of contents
237
A new hardware-assisted PIR with O(n) shuffle cost
Ding, Xuhua
/ Yang, Yanjiang
/ Deng, Robert H.
et al.
| 2010
253
EXAM: a comprehensive environment for the analysis of access control policies
Lin, Dan
/ Rao, Prathima
/ Bertino, Elisa
et al.
| 2010
275
A new probabilistic rekeying method for secure multicast groups
Pais, Alwyn R.
/ Joshi, Shankar
et al.
| 2010
287
Efficient online/offline identity-based signature for wireless sensor network
Liu, Joseph K.
/ Baek, Joonsang
/ Zhou, Jianying
et al.
| 2010
297
How to construct identity-based signatures without the key escrow problem
Yuen, Tsz Hon
/ Susilo, Willy
/ Mu, Yi
et al.
| 2010