Proceedings of the 2nd IFIP international conference on Computer security: a global challenge
Is there an ultimate use of cryptography?
Proceedings on Advances in cryptology---CRYPTO '86
An abstract theory of computer viruses (invited talk)
CRYPTO '88 Proceedings on Advances in cryptology
A survey of hardware implementations of RSA (abstract)
CRYPTO '89 Proceedings on Advances in cryptology
Passports and visas versus IDs
Computers and Security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Protection in operating systems
Communications of the ACM
Towards Robust Computation on Encrypted Data
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Computing on authenticated data for adjustable predicates
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |