1–20 of 35 hits
Sort by:
Sort by:
-
Bilinear Entropy Expansion from the Decisional Linear Assumption
Free accessSpringer Verlag | 2015| -
Bilinear Entropy Expansion from the Decisional Linear Assumption
British Library Conference Proceedings | 2015| -
Communication-Optimal Proactive Secret Sharing for Dynamic Groups
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Private Database Access with HE-over-ORAM Architecture
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
mrPUF: A Novel Memristive Device Based Physical Unclonable Function
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
On the XOR of Multiple Random Permutations
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Exploiting Eye Tracking for Smartphone Authentication
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
A Signature Scheme with a Fuzzy Private Key
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Arithmetic Addition over Boolean Masking
Towards First- and Second-Order Resistance in HardwareSpringer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Generic Construction of UC-Secure Oblivious Transfer
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Zero-Knowledge Authenticated Order Queries and Order Statistics on a List
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Cryptographic Enforcement of Information Flow Policies Without Public Information
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Recovering Lost Device-Bound Credentials
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
A Fully Decentralized Data Usage Control Enforcement Infrastructure
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Differential Power Analysis of a McEliece Cryptosystem
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.