kw.\*:("adaptive security")
Results 1 to 5 of 5
Selection :
A framework for universally composable non-committing blind signaturesABE, Masayuki; OHKUBO, Miyako.International journal of applied cryptography (Print). 2012, Vol 2, Num 3, pp 229-249, issn 1753-0563, 21 p.Article
Adaptive versus non-adaptive security of multi-party protocolsCANETTI, Ran; DAMGARD, Ivan; DZIEMBOWSKI, Stefan et al.Journal of cryptology. 2004, Vol 17, Num 3, pp 153-207, issn 0933-2790, 55 p.Article
The Integration of Diversely Redundant Designs, Dynamic System Models, and State Estimation Technology to the Cyber Security of Physical SystemsHOROWITZ, Barry M; PIERCE, Katherine M.Systems engineering (Print). 2013, Vol 16, Num 4, pp 401-412, issn 1098-1241, 12 p.Article
A System-Aware Cyber Security ArchitectureJONES, Rick A; HOROWITZ, Barry.Systems engineering (Print). 2012, Vol 15, Num 2, pp 225-240, issn 1098-1241, 16 p.Article
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious TransferLINDELL, Yehuda; ZAROSIM, Hila.Journal of cryptology. 2011, Vol 24, Num 4, pp 761-799, issn 0933-2790, 39 p.Article