Probabilistic encryption

Results: 76



#Item
51MrCrypt: Static Analysis for Secure Cloud Computations Sai Deep Tetali Mohsen Lesani  Rupak Majumdar

MrCrypt: Static Analysis for Secure Cloud Computations Sai Deep Tetali Mohsen Lesani Rupak Majumdar

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2013-07-29 19:36:50
52or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Explicit Randomness is not Necessary when Modeling Probabilistic Encryption 1 V´eronique Cortier Heinrich H¨ordegen Bogdan Warins

or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Explicit Randomness is not Necessary when Modeling Probabilistic Encryption 1 V´eronique Cortier Heinrich H¨ordegen Bogdan Warins

Add to Reading List

Source URL: 78.47.219.106

Language: English - Date: 2014-05-19 07:36:07
53SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

Add to Reading List

Source URL: bbcr.uwaterloo.ca

Language: English - Date: 2011-07-16 17:53:26
54A Survey of Homomorphic Encryption for Nonspecialists

A Survey of Homomorphic Encryption for Nonspecialists

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2012-02-01 11:05:22
55

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
56Chapter 69  Verifiable Voting Systems Thea Peacock1 , Peter Y. A. Ryan1 , Steve Schneider2 and Zhe Xia2 1

Chapter 69 Verifiable Voting Systems Thea Peacock1 , Peter Y. A. Ryan1 , Steve Schneider2 and Zhe Xia2 1

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
57CS255: Cryptography and Computer Security  Winter 2012 Assignment #2 Due: 5pm Friday, Feb. 17, 2012.

CS255: Cryptography and Computer Security Winter 2012 Assignment #2 Due: 5pm Friday, Feb. 17, 2012.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-02-09 13:04:29
58RZ 3628 (# [removed]Computer Science 16 pages

RZ 3628 (# [removed]Computer Science 16 pages

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-06-29 07:25:33
59Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-12-20 13:03:42
60CS255: Cryptography and Computer Security  Winter 2009

CS255: Cryptography and Computer Security Winter 2009

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-03-10 01:08:56