Search

Your search keyword '"Jajodia, S."' showing total 284 results

Search Constraints

Start Over You searched for: Author "Jajodia, S." Remove constraint Author: "Jajodia, S."
284 results on '"Jajodia, S."'

Search Results

3. Metadata Management in Outsourced Encrypted Databases

8. Spam Filter Analysis

9. An operation-based metric for CPA resistance

10. Attack Tree Generation by Policy Invalidation

11. Creating objects in the flexible authorization framework

12. Cyber SA : situational awareness for cyber defense

13. Privacy Design Strategies

14. Dismantling MIFARE Classic

19. Witness hiding

20. Vector Space

21. Oblivious transfer

22. Decoding algorithms

24. Hash based signatures

25. Threshold homomorphic cryptosystems

27. Encyclopedia of Cryptography and Security

28. Interactive argument

29. Protocol

30. Formal privacy analysis of communication protocols for identity management

31. Edwards Curves

33. Pairing-based key exchange

34. Multiparty computation

35. Interactive proof

36. Verifiable secret sharing

37. Zero-knowledge

38. Privacy Design Strategies

39. Preserving confidentiality of security policies in data outsourcing scenarios

40. Chinese Remainder Theorem

41. Measuring intrusion detection capability : an information-theoretic approach

43. Non-interactive proof

44. Incrementally Maintaining Materializations of Ontologies Stored in Logic Databases

50. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

Catalog

Books, media, physical & digital resources