nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
|
Lindell, Yehuda |
|
2010 |
24 |
4 |
p. 761-799 |
artikel |
2 |
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
|
Lindell, Yehuda |
|
|
24 |
4 |
p. 761-799 |
artikel |
3 |
Efficient Selective Identity-Based Encryption Without Random Oracles
|
Boneh, Dan |
|
2010 |
24 |
4 |
p. 659-693 |
artikel |
4 |
Efficient Selective Identity-Based Encryption Without Random Oracles
|
Boneh, Dan |
|
|
24 |
4 |
p. 659-693 |
artikel |
5 |
Resource Fairness and Composability of Cryptographic Protocols
|
Garay, Juan A. |
|
2010 |
24 |
4 |
p. 615-658 |
artikel |
6 |
Resource Fairness and Composability of Cryptographic Protocols
|
Garay, Juan A. |
|
|
24 |
4 |
p. 615-658 |
artikel |
7 |
Secure Computation Without Authentication
|
Barak, Boaz |
|
2010 |
24 |
4 |
p. 720-760 |
artikel |
8 |
Secure Computation Without Authentication
|
Barak, Boaz |
|
|
24 |
4 |
p. 720-760 |
artikel |
9 |
Securely Obfuscating Re-Encryption
|
Hohenberger, Susan |
|
2010 |
24 |
4 |
p. 694-719 |
artikel |
10 |
Securely Obfuscating Re-Encryption
|
Hohenberger, Susan |
|
|
24 |
4 |
p. 694-719 |
artikel |