Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Oráculo aleatorio")

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 9 of 9

  • Page / 1
Export

Selection :

  • and

Lattice-based message recovery signature schemesMIAOMIAO TIAN; LIUSHENG HUANG.International journal of electronic security and digital forensics (Print). 2013, Vol 5, Num 3-4, pp 257-269, issn 1751-911X, 13 p.Article

Tuning a two-round group key agreementWEIZHENG GAO; NEUPANE, Kashi; STEINWANDT, Rainer et al.International journal of information security (Print). 2014, Vol 13, Num 5, pp 467-476, issn 1615-5262, 10 p.Article

Unforgeability of an improved certificateless signature scheme in the standard modelCHAOWEN GUAN; JIAN WENG; DENG, Robert H et al.IET information security (Print). 2014, Vol 8, Num 5, pp 273-276, issn 1751-8709, 4 p.Article

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard modelXIMENG LIU; JIANFENG MA; JINBO XIONG et al.IET information security (Print). 2014, Vol 8, Num 4, pp 217-223, issn 1751-8709, 7 p.Article

Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systemsLEE, Tian-Fu.Computer methods and programs in biomedicine (Print). 2014, Vol 117, Num 3, pp 464-472, issn 0169-2607, 9 p.Article

Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networksYINGHUI ZHANG; XIAOFENG CHEN; JIN LI et al.Computer networks (1999). 2014, Vol 75, pp 192-211, issn 1389-1286, 20 p., aArticle

Private mutual authentications with fuzzy matchingYAMIN WEN; ZHENG GONG.International journal of high performance systems architecture (Print). 2014, Vol 5, Num 1, pp 3-12, issn 1751-6528, 10 p.Conference Paper

A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL AttackSK HAFIZUL ISLAM.Wireless personal communications. 2014, Vol 79, Num 3, pp 1975-1991, issn 0929-6212, 17 p.Article

Versatile identity-based signatures for authentication in multi-user settingsXI SUN; ZHENGTAO JIANG; MEIRONG ZHOU et al.International journal of grid and utility computing (Print). 2014, Vol 5, Num 3, pp 156-164, issn 1741-847X, 9 p.Article

  • Page / 1