<--- Back to Details
First PageDocument Content
Databases / Springer Protocols / Springer Science+Business Media / RSS / News aggregator / Communications protocol / Web search engine / Website / Features of Firefox / Computing / Information / Data
Date: 2012-04-27 08:59:48
Databases
Springer Protocols
Springer Science+Business Media
RSS
News aggregator
Communications protocol
Web search engine
Website
Features of Firefox
Computing
Information
Data

Microsoft Word - SpringerProtocolsUserGuide.doc

Add to Reading List

Source URL: static.springer.com

Download Document from Source Website

File Size: 505,90 KB

Share Document on Facebook

Similar Documents

Mass media / Springer Science+Business Media / Springer Protocols / Humana Press / Springer / Publishing / Academic publishing / Research methods

Microsoft Word - Document in Microsoft Internet Explorer

DocID: 1gyPM - View Document

Secure two-party computation / Oblivious transfer / Alice and Bob / Cryptography / Cryptographic protocols / Secure multi-party computation

Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz

DocID: 1g9Np - View Document

Extracellular / Intracellular / Cell membrane / Properties of water / Biology / Cell biology / Cryopreservation

International Series of Numerical Mathematics, Vol. 160, 521–540 c 2012 Springer Basel AG ⃝ Freezing of Living Cells: Mathematical Models and Design of Optimal Cooling Protocols

DocID: 1afRH - View Document

Springer Science+Business Media / Science / Computational biology / Molecular biology / Molecular medicine / Cell biology / Kürşad Türkşen / Current Protocols / Nature Protocols / Biology / Databases / Springer Protocols

SpringerProtocols Content Questions or updates email: Item 1 2 3

DocID: 13EVG - View Document

Commitment scheme / Universal composability / Oblivious transfer / Semantic security / RSA / Diffie–Hellman key exchange / Communications protocol / Cipher / Cryptography / Cryptographic protocols / ID-based encryption

An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

DocID: 13lu3 - View Document