Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2967
search results - page 73 / 594
»
Cryptology
Sort
relevance
views
votes
recent
update
View
thumb
title
69
click to vote
FC
2008
Springer
96
views
Cryptology
»
more
FC 2008
»
An Efficient Anonymous Credential System
14 years 10 months ago
Download
fc08.ifca.ai
Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto
claim paper
Read More »
65
click to vote
CHES
2010
Springer
142
views
Cryptology
»
more
CHES 2010
»
New Results on Instruction Cache Attacks
14 years 10 months ago
Download
www.iacr.org
Onur Aciiçmez, Billy Bob Brumley, Philipp G...
claim paper
Read More »
63
click to vote
FC
2010
Springer
164
views
Cryptology
»
more
FC 2010
»
Practical Private Set Intersection Protocols with Linear Complexity
14 years 10 months ago
Download
sprout.ics.uci.edu
Emiliano De Cristofaro, Gene Tsudik
claim paper
Read More »
33
click to vote
AES
2010
Springer
129
views
Cryptology
»
more
AES 2010
»
Block aggregation of stress constraints in topology optimization of structures
14 years 10 months ago
Download
caminos.udc.es
J. París, F. Navarrina, I. Colominas, M. Ca...
claim paper
Read More »
46
Voted
AES
2010
Springer
120
views
Cryptology
»
more
AES 2010
»
The quadratic MITC plate and MITC shell elements in plate bending
14 years 10 months ago
Download
web.mit.edu
Phill-Seung Lee, Klaus-Jürgen Bathe
claim paper
Read More »
« Prev
« First
page 73 / 594
Last »
Next »