1
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... -- Cryptographic Hash and Applications -- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited -- Higher...

2
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... and Application to Point Multiplication in ECC -- Applications -- Key Management for Secure Overlay Multicast...

3
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Inter-domain Identity-Based Proxy Re-encryption -- Access Control and Network Security -- Hardening...

4
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- Computation of Equilibria and Stable Solutions -- A Geometry of Networks -- Contributed Papers -- Systematic...

5
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Protection -- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation -- Trusted Network...

6
Published 2019
Springer International Publishing
Subjects: ...Computer Communication Networks...

7
Published 2015
Springer International Publishing
Subjects: ...Computer Communication Networks...

8
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... to Improve Efficiency of Multi-Party Computation -- Towards Attack Resilient Social Network Based Threshold...

9
Published 2023
Springer Nature Singapore
Table of Contents: ... Heterogeneous Graph Transformer Networks -- System and Network security -- DRoT: A Decentralised Root of Trust...

10
Published 2015
Springer International Publishing
Table of Contents: ... Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks...

11
Published 2016
Springer International Publishing
Table of Contents: ...Aspects of trusted computing systems -- Trusted modules -- Platforms -- Networks, services...

12
Published 2002
Springer Berlin Heidelberg
Table of Contents: ...Private Computation — k-Connected versus 1-Connected Networks -- Public-Key Encryption -- Analysis...