1
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...Cryptographic Applications -- Multi-party Computation from Any Linear Secret Sharing Scheme...

2
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...Systems Security and Trusted Computing -- Building Trusted Sub-domain for the Grid with Trusted...

3
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Knapsack Based Two-Lock Cryptosystem -- Success Probability in ? 2-Attacks -- More Generalized Clock...

4
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Management -- Searching for High-Value Rare Events with Uncheatable Grid Computing -- Digital Signatures Do...

5
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Distribution and Charging Scheme Using Group Signature -- Secret Handshake with Multiple Groups -- Internet...