Search

Your search keyword '"Di Crescenzo A"' showing total 129 results

Search Constraints

Start Over You searched for: Author "Di Crescenzo A" Remove constraint Author: "Di Crescenzo A" Publication Type eBooks Remove constraint Publication Type: eBooks
129 results on '"Di Crescenzo A"'

Search Results

1. The Safety Monitoring System for the SND@LHC Experiment at CERN

2. Robust Secure Aggregation for Co-located IoT Devices with Corruption Localization

4. Malignant Meningiomas

7. On Single-Server Delegation of RSA

8. A Survey on Delegated Computation

9. Encrypted-Input Obfuscation of Image Classifiers

10. Secure and Efficient Delegation of Pairings with Online Inputs

11. Secure and Efficient Delegation of Elliptic-Curve Pairing

12. Some Results on a Growth Model Governed by a Fractional Differential Equation

13. Secure Deterministic Automata Evaluation: Completeness and Efficient 2-party Protocols

14. Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory

15. Cryptographic Formula Obfuscation

16. Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups

17. Applications of the Quantile-Based Probabilistic Mean Value Theorem to Distorted Distributions

18. Cryptographic Password Obfuscation

19. Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks

20. Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols

21. Efficient Computations over Encrypted Data Blocks

22. Fractional Growth Process with Two Kinds of Jumps

23. Foundations of Optical Encryption: A Candidate Short-Key Scheme

24. Efficient and Secure Delegation of Group Exponentiation to a Single Server

25. Privacy-Preserving Range Queries from Keyword Queries

26. Foundations of Modern Cryptography

27. Practical and Privacy-Preserving Policy Compliance for Outsourced Data

28. On Minimizing the Size of Encrypted Databases

29. Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database

30. Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model

33. Some Results on Brownian Motion Perturbed by Alternating Jumps in Biological Modeling

34. Efficient and Private Three-Party Publish/Subscribe

35. Zero-Knowledge Proofs via Polynomial Representations

36. Data Forensics Constructions from Cryptographic Hashing and Coding

37. Neuronal Data Analysis Based on the Empirical Cumulative Entropy

39. Combinatorial Group Testing for Corruption Localizing Hashing

40. On the Statistical Dependency of Identity Theft on Demographics

41. A Neuronal Model with Excitatory and Inhibitory Inputs Governed by a Birth-Death Process

42. Corruption-Localizing Hashing

43. Foundations of Optical Encryption: Formal Modeling and Achieving Shannon Secrecy

44. Social Network Privacy via Evolving Access Control

45. Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model

46. Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model

47. On Cumulative Entropies and Lifetime Estimations

48. Succinct NP Proofs from an Extractability Assumption

49. 3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge

50. On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries

Catalog

Books, media, physical & digital resources