×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [security parameter]
Home >
security parameter
Solution Manual for Data Communications and Networking by Behrouz Forouzan_2
4.616 views
A Verifiable Secret Shuffle of Homomorphic Encryptions
652 views
IT1352 Cryptography and Network Security
155 views
lartc
22 views
Rv0xx_ CISCO Router Administration Guide
41 views
Quantum Money Scott Aaronson (MIT) Based partly on joint work with Ed Farhi, David Gosset, Avinatan Hassidim, Jon Kelner, Andy Lutomirski, and Peter Shor.
214 views
Universally Composable Symbolic Analysis of Cryptographic Protocols Ran Canetti and Jonathan Herzog 6 March 2006 The author's affiliation with The MITRE.
215 views
Privately Querying Location-based Services with SybilQuery Pravin Shankar, Vinod Ganapathy, and Liviu Iftode Department of Computer Science Rutgers University.
221 views
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
216 views
Its Not The Assumption, Its The Reduction GMfest13c Assumptions Panel Presentation Ran Canetti.
218 views
[PPT]
505 views
Cyber Security Defense-in-Depth Control Pyramid part 1 explanation
1.135 views
Next >