×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [security notions]
S EMANTICALLY - SECURE FUNCTIONAL ENCRYPTION : P OSSIBILITY RESULTS, IMPOSSIBILITY RESULTS AND THE QUEST FOR A GENERAL DEFINITION Adam O’Neill, Georgetown
223 views
Modern Cryptography Code: ICE0605 Credit/Hour : 3/3 Prof : Kwangjo Kim (Tel. x6118),
[email protected]
, kkj
[email protected]
TA :Hyunrok
222 views
Internal Security Scene VR RAGHAVAN 2003. Security Spectrum – 9/11 Terrorism the new RMA. Are democracies better or less able to cope with terrorism?
219 views
REDUCTION-RESILIENT CRYPTOGRAPHY: PRIMITIVES THAT RESIST REDUCTIONS FROM ALL STANDARD ASSUMPTIONS Daniel Wichs (Charles River Crypto Day ‘12)
223 views
Public key encryption: definitions and security
44 views
Adam O’Neill, Georgetown University Joint with Mihir Bellare , UCSD
20 views
Daniel Wichs (Charles River Crypto Day ‘12)
40 views