422 results on '"Pascal Lafourcade"'
Search Results
102. Les monnaies virtuelles décentralisées sont-elles des dispositifs d’avenir ?
103. Formally and practically verifying flow properties in industrial systems.
104. Authentication Attacks on Projection-based Cancelable Biometric Schemes.
105. Shadoks Approach to Low-Makespan Coordinated Motion Planning.
106. Design and practical implementation of verify-your-vote protocol.
107. Duck Attack on Accountable Distributed Systems.
108. Verifiable Private Polynomial Evaluation.
109. LocalPKI: An Interoperable and IoT Friendly PKI.
110. No Such Thing as a Small Leak: Leakage-Abuse Attacks Against Symmetric Searchable Encryption.
111. Formally Verifying Flow Properties in Industrial Systems.
112. Formal Analyze of a Private Access Control Protocol to a Cloud Storage.
113. LOCALPKI: A User-Centric Formally Proven Alternative to PKIX.
114. Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption.
115. Formal Analysis of Combinations of Secure Protocols.
116. Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures.
117. Secure Matrix Multiplication with MapReduce.
118. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
119. Breaking and fixing the HB+DB protocol.
120. Optimal Threshold Padlock Systems.
121. Computing AES related-key differential characteristics with constraint programming.
122. Protego: A Credential Scheme for Permissioned Blockchains (Extended Version).
123. RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol (Long version).
124. How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
125. Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle.
126. Revisiting AES related-key differential attacks with constraint programming.
127. Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering
128. A Posteriori Openable Public Key Encryption.
129. Private Multi-party Matrix Multiplication and Trust Computations.
130. Two Secure Anonymous Proxy-based Data Storages.
131. Anonymizable Ring Signature Without Pairing.
132. Related-Key Cryptanalysis of Midori.
133. Formal Analysis of Security Properties on the OPC-UA SCADA Protocol.
134. k-Times Full Traceable Ring Signature.
135. Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen.
136. A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol.
137. Formal analysis and offline monitoring of electronic exams.
138. Dual protocols for private multi-party matrix multiplication and trust computations.
139. How to explain modern security concepts to your children.
140. SR3: secure resilient reputation-based routing.
141. Automated Verification of e-Cash Protocols.
142. Formal Analysis of E-Cash Protocols.
143. SLACK-MAC: Adaptive MAC Protocol for Low Duty-Cycle Wireless Sensor Networks.
144. Survey of Distance Bounding Protocols and Threats.
145. Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties.
146. A Framework for Analyzing Verifiability in Traditional and Electronic Exams.
147. Monitoring Electronic Exams.
148. A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking.
149. Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equivalence Classes.
150. Generic Plaintext Equality and Inequality Proofs (Extended Version).
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.