714 results on '"BARBOSA, MANUEL"'
Search Results
2. C’est Très CHIC: A Compact Password-Authenticated Key Exchange from Lattice-Based KEM
3. Execution Time Program Verification With Tight Bounds
4. Formally Verifying Kyber : Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt
5. Bare PAKE: Universally Composable Key Exchange from Just Passwords
6. International Student Mobility: An Empirical Study Based on FEUP Mechanical Engineering Data
7. Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head
8. Decentralized Privacy-Preserving Proximity Tracing
9. Machine-Checked Security for
10. Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium
11. Execution Time Program Verification with Tight Bounds
12. The Last Mile: High-Assurance and High-Speed Cryptographic Implementations
13. Execution Time Program Verification with Tight Bounds
14. Machine-Checked Security for $$\textrm{XMSS} $$ as in RFC 8391 and $$\mathrm {SPHINCS^{+}} $$
15. Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium
16. Continuous Sedation in Palliative Care in Portugal: A Prospective Multicentric Study.
17. A formal treatment of the role of verified compilers in secure computation
18. Algebraic Adversaries in the Universal Composability Framework
19. Provable Security Analysis of FIDO2
20. Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification
21. Universally Composable Relaxed Password Authenticated Key Exchange
22. Continuous Sedation in Palliative Care in Portugal: A Prospective Multicentric Study
23. X-Wing
24. Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality
25. Effects of Aging and Nerve Growth Factor on Neuropeptide Expression and Cholinergic Innervation of the Rat Basolateral Amygdala
26. Recurrent Neural Networks and Three-Point Bending Test on the Identification of Material Hardening Parameters
27. IX congreso iberoamericano de psicología jurídica - Manuel Javier Támara Barbosa -Barranquilla, Colombia - 2014
28. Provable Security Analysis of FIDO2
29. Indifferentiable Authenticated Encryption
30. A Novel Concept of CNC Machining Center Automatic Feeder
31. Secure Multiparty Computation from SGX
32. Labeled Homomorphic Encryption : Scalable and Privacy-Preserving Processing of Outsourced Data
33. Historical Context of Environmental Education in the Amazon: a bibliographic review
34. Universally Composable Relaxed Password Authenticated Key Exchange
35. Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification
36. Diagnosis, treatment, and work impact of iron deficiency anemia in a Portuguese urban community
37. Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC
38. Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
39. Conformance testing issues with application to the CANopen protocol
40. Rogue key and impersonation attacks on FIDO2: From theory to practice
41. Mechanized Proofs of Adversarial Complexity and Application to Universal Composability
42. Strategies to improve destination accessibility: The Case of Vieira do Minho
43. Formally verifying Kyber
44. Traffic management and control of automated guided vehicles using artificial neural networks
45. Education and struggles for recognition: the strategic role of empowerment
46. The Related-Key Analysis of Feistel Constructions
47. Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality
48. O Contexto Histórico da Educação Ambiental no Amazonas: uma revisão bibliográfica
49. Vulnerabilização Digital da Democracia e Ação Educativa.
50. Educação, poder e resistência na era digital
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.