Showing 1 - 8 results of 8 for search 'Pieprzyk Josef', query time: 0.03s
Refine Results
-
1
-
2
Signcryption schemes with insider security in an ideal permutation model by Bansal Tarun Kumar, Boyen Xavier, Pieprzyk Josef
Published 2019-06-01
Article -
3
New security notions and relations for public-key encryption by Sepahi Reza, Pieprzyk Josef, Shahandashti Siamak F., Schoenmakers Berry
Published 2012-12-01
Article -
4
Security analysis of linearly filtered NLFSRs by Orumiehchiha Mohammad Ali, Pieprzyk Josef, Steinfeld Ron, Bartlett Harry
Published 2013-12-01
Article -
5
A subexponential construction of graph coloring for multiparty computation by Asghar Hassan Jameel, Desmedt Yvo, Pieprzyk Josef, Steinfeld Ron
Published 2014-12-01
Article -
6
-
7
Information security and privacy [electronic resource]: 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings/ by ACISP 2007 (2007 : Townsville, Qld.), Pieprzyk, Josef, 1949-, Ghodosi, Hossein, Dawson, Ed (Edward), SpringerLink (Online service)
Published 2007
-
8