Sciweavers

5119 search results - page 29 / 1024
» Security Privacy
Sort
View
CCS
2007
ACM
15 years 3 months ago
Trusted computing challenges
Leendert van Doorn
ESORICS
2007
Springer
15 years 3 months ago
A Logic for State-Modifying Authorization Policies
Moritz Y. Becker, Sebastian Nanz
ESORICS
2007
Springer
15 years 3 months ago
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Michel Abdalla, Eike Kiltz, Gregory Neven
EUROPKI
2007
Springer
15 years 3 months ago
Universally Composable Signcryption
Kristian Gjøsteen, Lillian Kråkmo