Springer Protocols

Results: 24



#Item
1Mass media / Springer Science+Business Media / Springer Protocols / Humana Press / Springer / Publishing / Academic publishing / Research methods

Microsoft Word - Document in Microsoft Internet Explorer

Add to Reading List

Source URL: www.mpstechnologies.com

Language: English - Date: 2012-06-14 07:38:43
2Secure two-party computation / Oblivious transfer / Alice and Bob / Cryptography / Cryptographic protocols / Secure multi-party computation

Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz

Add to Reading List

Source URL: u.cs.biu.ac.il

Language: English - Date: 2012-02-29 01:45:21
3Extracellular / Intracellular / Cell membrane / Properties of water / Biology / Cell biology / Cryopreservation

International Series of Numerical Mathematics, Vol. 160, 521–540 c 2012 Springer Basel AG ⃝ Freezing of Living Cells: Mathematical Models and Design of Optimal Cooling Protocols

Add to Reading List

Source URL: www-m6.ma.tum.de

Language: English - Date: 2013-03-11 10:39:28
4Springer Science+Business Media / Science / Computational biology / Molecular biology / Molecular medicine / Cell biology / Kürşad Türkşen / Current Protocols / Nature Protocols / Biology / Databases / Springer Protocols

SpringerProtocols Content Questions or updates email: Item 1 2 3

Add to Reading List

Source URL: palmoilis.mpob.gov.my

Language: English - Date: 2014-03-09 23:40:21
5Commitment scheme / Universal composability / Oblivious transfer / Semantic security / RSA / Diffie–Hellman key exchange / Communications protocol / Cipher / Cryptography / Cryptographic protocols / ID-based encryption

An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-02 11:56:16
6Diffie–Hellman key exchange / Key-agreement protocol / Advantage / Diffie–Hellman problem / Cryptographic nonce / Adversary model / SPEKE / Secure Remote Password protocol / Cryptography / Cryptographic protocols / Random oracle

A preliminary version appears in ISC 2009, Lecture Notes in Computer Science, Springer-Verlag, 2009. This version is dated December 18, 2009. Security Analysis of the PACE Key-Agreement Protocol Jens Bender1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-18 06:37:52
7Computing / Tokens / Data transmission / Security token / Oblivious transfer / Actor model / Token / Universal composability / Access token / Cryptographic protocols / Data / Information

c IACRThis article is the final version submitted by the author(s) to the IACR and to Springer-Verlag on 2013 December 3. The version published by Springer-Verlag is available at . (Efficient) Universally C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-11 22:12:12
8Science / Humana Press / Methods in Molecular Biology / Springer Protocols / International Standard Serial Number / OhioLINK / Communications protocol / Research methods / Information / Data

CWRU and Associated Libraries

Add to Reading List

Source URL: www.case.edu

Language: English - Date: 2011-03-16 11:15:23
9Databases / Springer Protocols / Springer Science+Business Media / RSS / News aggregator / Communications protocol / Web search engine / Website / Features of Firefox / Computing / Information / Data

Microsoft Word - SpringerProtocolsUserGuide.doc

Add to Reading List

Source URL: static.springer.com

Language: English - Date: 2012-04-27 08:59:48
10Secure multi-party computation / Communications protocol / RSA / Transmission Control Protocol / Cryptography / Cryptographic protocols / Public-key cryptography

private_matching_springer.pdf

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:42:25
UPDATE