66 results on '"K FRANKLIN"'
Search Results
2. Unique Ring Signatures: A Practical Construction.
3. Optimal Coding for Streaming Authentication and Interactive Communication.
4. Unique Group Signatures.
5. Efficient and Secure Evaluation of Multivariate Polynomials and Applications.
6. Fair Threshold Decryption with Semi-Trusted Third Parties.
7. Communication-Efficient Private Protocols for Longest Common Subsequence.
8. Multi-party Indirect Indexing and Applications.
9. Towards Optimal and Efficient Perfectly Secure Message Transmission.
10. Weakly-Private Secret Sharing Schemes.
11. Secure Linear Algebra Using Linearly Recurrent Sequences.
12. Improved Efficiency for Private Stable Matching.
13. Edge Eavesdropping Games.
14. Efficiency Tradeoffs for Malicious Two-Party Computation.
15. Efficient Polynomial Operations in the Shared-Coefficients Setting.
16. A Generic Construction for Intrusion-Resilient Public-Key Encryption.
17. Intrusion-Resilient Public-Key Encryption.
18. Self-Healing Key Distribution with Revocation.
19. Lower Bounds for Multicast Message Authentication.
20. Identity-Based Encryption from the Weil Pairing.
21. Commital Deniable Proofs and Electronic Campaign Finance.
22. Distribution chain security.
23. Enhancing privacy and trust in electronic communities.
24. Self-Testing/Correcting Protocols (Extended Abstract).
25. Anonymous Authentication with Subset Queries (extended abstract).
26. An Efficient Public Key Traitor Tracing Scheme.
27. Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties.
28. Secure Communications in Minimal Connectivity Models.
29. Mutual Search (Extended Abstract).
30. Reliable Communication over Partially Authenticated Networks.
31. Auditable Metering with Lightweight Security.
32. Fair Exchange with a Semi-Trusted Third Party (extended abstract).
33. Efficient Generation of Shared RSA Keys (Extended Abstract).
34. The Omega Key Management Service.
35. Low-Exponent RSA with Related Messages.
36. Multi-Autority Secret-Ballot Elections with Linear Work.
37. Secure hypergraphs: privacy from partial broadcast (Extended Abstract).
38. The design and implementation of a secure auction service.
39. Verifiable Signature Sharing.
40. Removing thin cirrus cloud effects in Hyperion data using the 1.38 and 1.87 μm water vapor absorption bands.
41. The Blinding of Weak Signatures (Extended Abstract).
42. Secure and Efficient Off-Line Digital Money (Extended Abstract).
43. Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems
44. Joint Encryption and Message-Efficient Secure Computation.
45. 3DPIN: Enhancing security with 3D display.
46. Communication Complexity of Secure Computation (Extended Abstract)
47. Protecting privacy while sharing information in electronic communities.
48. Multi-Level Specification and Verification of Real-Time Software.
49. Privacy-preserving alibi systems.
50. An Algebraic Approach to IP Traceback.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.