9 results on '"Naomi Farley"'
Search Results
2. Tree-Based Cryptographic Access Control.
3. Cryptographic enforcement of information flow policies without public information via tree partitions.
4. Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies.
5. Cryptographic Enforcement of Information Flow Policies Without Public Information.
6. BADGER - Blockchain Auditable Distributed (RSA) key GEneRation.
7. Cryptographic Enforcement of Information Flow Policies without Public Information via Tree Partitions.
8. Cryptographic Enforcement of Information Flow Policies without Public Information.
9. Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.