Results 271 to 278 of about 27,441 (278)
Some of the next articles are maybe not open access.

New identity-based three-party authenticated key agreement protocol with provable security

Journal of Network and Computer Applications, 2013
Hu Xiong, Fagen Li
exaly  

Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage

IEEE Transactions on Parallel and Distributed Systems, 2012
Yan Zhu, Gail-Joon Ahn, Mengyang Yu
exaly  

Provable Security in the Real World

IEEE Security and Privacy, 2011
exaly  

QUAD: A multivariate stream cipher with provable security

Journal of Symbolic Computation, 2009
exaly  

Home - About - Disclaimer - Privacy