Search

Your search keyword '"Henrich, C"' showing total 59 results

Search Constraints

Start Over You searched for: Author "Henrich, C" Remove constraint Author: "Henrich, C" Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
59 results on '"Henrich, C"'

Search Results

1. Study of N=50Z=3282 gap evolution around N=50Z=3282: new structure information for N=50Z=3282Ge

2. Chameleon-Hashes with Ephemeral Trapdoors : And Applications to Invisible Sanitizable Signatures

3. Experimental evidence for low-lying quadrupole isovector excitation of 208Po

5. Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures

7. Non-interactive Public Accountability for Sanitizable Signatures

8. Malleable Signatures for Resource Constrained Platforms

9. On Structural Signatures for Tree Data Structures

10. The Role of Data Integrity in EU Digital Signature Legislation — Achieving Statutory Trust for Sanitizable Signature Schemes

11. Redactable Signatures for Independent Removal of Structure and Content

12. Sanitizable Signatures in XML Signature — Performance, Mixing Properties, and Revisiting the Property of Transparency

13. Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data

14. Smartcard Firewalls Revisited

25. Chameleon-Hashes with Ephemeral Trapdoors

26. Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures

27. Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions

28. Malleable Signatures for Resource Constrained Platforms

29. Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity

30. Non-interactive Public Accountability for Sanitizable Signatures

31. Redactable Signatures for Independent Removal of Structure and Content

32. On Structural Signatures for Tree Data Structures

33. Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems

34. The Role of Data Integrity in EU Digital Signature Legislation — Achieving Statutory Trust for Sanitizable Signature Schemes

35. Sanitizable Signatures in XML Signature — Performance, Mixing Properties, and Revisiting the Property of Transparency

36. Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data

37. Smartcard Firewalls Revisited

39. Assisting Server for Secure Multi-Party Computation

40. Optimal Parameters for Efficient Two-Party Computation Protocols

41. ROAC: A Role-Oriented Access Control Model

42. HiPoLDS: A Security Policy Language for Distributed Systems

43. Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices

44. Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android

45. Impossible Differential Cryptanalysis of Reduced-Round LBlock

46. An Efficient Lattice-Based Secret Sharing Construction

47. On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems

48. Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications

49. Privacy Preservation of User History Graph

50. How to Break EAP-MD5

Catalog

Books, media, physical & digital resources