Filter your results
- 3
- 2
- 3
- 2
- 5
- 1
- 1
- 2
- 1
- 5
- 2
- 1
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
5 results
|
|
sorted by
|
|
Fair Private Set Intersection with a Semi-trusted Arbiter27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.128-144, ⟨10.1007/978-3-642-39256-6_9⟩
Conference papers
hal-01490721v1
|
||
Open Problems in Network SecuritySpringer, LNCS-7039, 2012, Lecture Notes in Computer Science, 978-3-642-27584-5. ⟨10.1007/978-3-642-27585-2⟩
Books
hal-01481511v1
|
|||
|
Open Research Problems in Network SecuritySpringer, LNCS-6555, 2011, Lecture Notes in Computer Science, 978-3-642-19227-2. ⟨10.1007/978-3-642-19228-9⟩
Books
hal-01581329v1
|
||
|
Open Problems in Network SecuritySpringer, LNCS-9591, 2016, Open Problems in Network Security, 978-3-319-39027-7. ⟨10.1007/978-3-319-39028-4⟩
Books
hal-01445799v1
|
||
|
Data-Minimizing Authentication Goes Mobile13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.55-71, ⟨10.1007/978-3-642-32805-3_5⟩
Conference papers
hal-01540904v1
|