Search

Your search keyword '"Standard model (cryptography)"' showing total 3,336 results

Search Constraints

Start Over You searched for: Descriptor "Standard model (cryptography)" Remove constraint Descriptor: "Standard model (cryptography)"
3,336 results on '"Standard model (cryptography)"'

Search Results

1. Generic Construction of Black-Box Traceable Attribute-Based Encryption

2. Efficient Attribute Based Server-Aided Verification Signature

3. Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption

4. A Framework for Accelerating Transformer-Based Language Model on ReRAM-Based Architecture

5. Secure Similarity Search Over Encrypted Non-Uniform Datasets

6. Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques

7. Deep Learning for Securing Software-Defined Industrial Internet of Things: Attacks and Countermeasures

8. Tightly secure ring signatures in the standard model

9. Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things

10. Toward an Early Warning System for Monitoring Asylum-Related Migration Flows in Europe

11. Secure Outsourced Attribute-Based Signatures with Perfect Anonymity in the Standard Model

12. An efficient identity-based signature scheme with provable security

13. Adventures with Particles

14. Algorithm-hardware Co-design of Attention Mechanism on FPGA Devices

15. The history and future of AI

16. Update on Analysis of Lesamnta-LW and New PRF Mode LRF

17. CCA-security from adaptive all-but-one lossy trapdoor functions

18. Incentives and Careers in Academia: Theory and Empirical Analysis

19. Mathematical Tools to Understand the Field Theories of the Standard Model and Beyond

20. VALUE AT RISK WITH STOCHASTIC VOLATILITY PERTURBED BY HURST PARAMETER

21. An instruction set for reversible Turing machines

22. Construction Plan of the Standard Model According to Small Scale Shelter Standard in Korea and Foreign Country

23. Establishment of Standard Models According to Public Building Types for the Green-Remodeling Pre-Decision Making Supporting Tools

24. Wireless Automatic Body Temperature Sensing System with Non-Contact Infrared Via the Internet for Medical Promotion

25. Using a Standard Model to Identify the Saving Determinants in the Kingdom of Saudi Arabia

26. Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model

27. Search with Wage Posting under Sticky Prices

28. Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks

29. CNC-C2: an ISO14649 and IEC61499 compliant controller

30. Post-quantum blind signcryption scheme from lattice

31. Scientific realism, or the risks of importing research models into psychology

32. Reflections on an application of realism in psychology

33. Simulação numérica do escoamento atmosférico sobre edifícios altos para determinação do efeito de vizinhança

34. Hardness of Learning in Rich Environments and Some Consequences for Financial Markets

35. Simple and efficient FE for quadratic functions

36. Does model complexity improve pricing accuracy? The case of CoCos

37. Voluntary and mandatory provision of common-pool resources with heterogeneous users

38. Intertemporal choice with health-dependent discounting

39. Indifferentiable hash functions in the standard model

40. Reward and fictive prediction error signals in ventral striatum: asymmetry between factual and counterfactual processing

41. Secure Data Access Control with Cipher Text Update and Computation Outsourcing in Fog Computing for Internet of Things

42. On incentive compatible, individually rational public good provision mechanisms

43. Measurements for the institutional cohesion dimension of the standard model of military group cohesion

44. Equilibria Under Negligence Liability

45. Binary Tree Encryption with Constant-Size Public Key in the Standard Model

46. Dynamic Inconsistency and Incentive Design: Insights from Behavioural Economics for HR Managers

47. A Case against a 4% Inflation Target

48. IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability

49. Test model coverage analysis under uncertainty: extended version

50. Max Weber and Social Ontology

Catalog

Books, media, physical & digital resources