Uploads
Contact
/
Login
Upload
Search Results for 'Adversary Secure'
A Logic of Secure Systems with Tunable Adversary Models
faustina-dinatale
Stream ciphers
briana-ranney
Introduction to Provable Security
faustina-dinatale
A Logic of Secure Systems and its Application to Trusted Co
tatiana-dople
Secure In-Band Wireless Pairing
danika-pritchard
Leakage-Resilient
min-jolicoeur
Leakage-Resilient
tatyana-admore
Message Integrity
jane-oiler
How Secure is Your Business?
yoshiko-marsland
Introduction to Provable Security Models, Adversaries, Reductions
pamella-moone
Secure Communication for Signals
luanne-stotts
Secure Communication for Distributed Systems
pamella-moone
The adversary A can concurrently make
luanne-stotts
Cryptography and Network Security
alexa-scheidler
Multi-Path-Based Avoidance Routing in Wireless Networks
mitsue-stanley
Secure Computation
pamella-moone
15 Nov 2012
yoshiko-marsland
Freedom not Fear:
stefany-barnette
Authenticated Encryption
lindy-dunigan
A new provably secure
danika-pritchard
Freedom not Fear:
briana-ranney
Cryptography
phoebe-click
B FORM ADVERSARY PROCEEDING COVER SHEET ADVERSARY PR
myesha-ticknor
Computational indistinguishability
yoshiko-marsland
1
2
3
4
5
6