A Uniform Presentation of Confidentiality Properties
IEEE Transactions on Software Engineering
Secret-key reconciliation by public discussion
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
The asymptotic complexity of merging networks
Journal of the ACM (JACM)
On Some Methods for Unconditionally Secure Key Distributionand Broadcast Encryption
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
The analysis of hybrid trie structures
Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms
On the Composition of Matroids and Ideal Secret Sharing Schemes
Designs, Codes and Cryptography
Linear Key Predistribution Schemes
Designs, Codes and Cryptography
Some facets of complexity theory and cryptography: A five-lecture tutorial
ACM Computing Surveys (CSUR)
Cellular Automata Based Cryptosystem (CAC)
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
ILP '99 Proceedings of the 9th International Workshop on Inductive Logic Programming
How to Fool an Unbounded Adversary with a Short Key
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Cryptosystem Designed for Embedded System Security
VLSID '03 Proceedings of the 16th International Conference on VLSI Design
Linear broadcast encryption schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Perception and haptics: towards more accessible computers for motion-impaired users
Proceedings of the 2001 workshop on Perceptive user interfaces
Improving the trade-off between storage and communication in broadcast encryption schemes
Discrete Applied Mathematics
Can user models be learned at all? Inherent problems in machine learning for user modelling
The Knowledge Engineering Review
(6,3)-MDS Codes over an Alphabet of Size 4
Designs, Codes and Cryptography
A new approach to intelligent text filtering based on novelty detection
ADC '06 Proceedings of the 17th Australasian Database Conference - Volume 49
Tandem coding and cryptography on wiretap channels: EXIT chart analysis
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Bit-oriented generators for Wireless Sensor Networks and low cost RFID transponders
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
Enhancing secrecy by data compression: theoretical and practical aspects
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Physical-layer security: combining error control coding and cryptography
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Pseudorandom sequences and stream ciphers
Algorithms and theory of computation handbook
Building one-time memories from isolated qubits: (extended abstract)
Proceedings of the 5th conference on Innovations in theoretical computer science
Hi-index | 0.00 |