Filter your results
- 3
- 3
- 3
- 1
- 1
- 1
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.60-75, ⟨10.1007/978-3-642-22348-8_7⟩
Conference papers
hal-01586579v1
|
||
|
A Trusted UI for the Mobile Web29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.127-141, ⟨10.1007/978-3-642-55415-5_11⟩
Conference papers
hal-01370360v1
|
||
|
Non-interactive Private Decision Tree Evaluation34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.174-194, ⟨10.1007/978-3-030-49669-2_10⟩
Conference papers
hal-03243640v1
|