Filter your results
- 3
- 3
- 3
- 2
- 1
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.66-84, ⟨10.1007/978-3-030-41702-4_5⟩
Conference papers
hal-03173902v1
|
||
|
A resource usage efficient distributed allocation algorithm for 5G Service Function ChainsDAIS 2020 - 20th IFIP WG 6.1 International Conference Distributed Applications and Interoperable Systems, Jun 2020, Valetta, Malta. pp.169-185, ⟨10.1007/978-3-030-50323-9_11⟩
Conference papers
hal-02975998v1
|
||
|
Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography (Invited Talk)12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.7-11, ⟨10.1007/978-3-030-20074-9_2⟩
Conference papers
hal-02294605v1
|