SAC TRECK 2008
Lower and Upper Bounds on Obtaining History Independence Niv Buchbinder and Erez Petrank Technion, Israel.
PowerPoint Slides (PPT)
C Sharp Jn (3)
Attribute Based Encryption with Privacy Preserving In Clouds
1 February 10, 2014 Presented By: Michael E. Parker, P.E. Parker Environmental and Consulting, LLC Hydraulic Fracturing Best Management Practices Comments.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
1 How to securely outsource cryptographic computations Susan Hohenberger and Anna Lysyanskaya TCC2005.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
A Generic Approach for Generating Interesting Interactive Pac-Man Opponents 作者 :Georgios N.Yannakakis & John Hallam.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
1 Hardware-Based Implementations of Factoring Algorithms Factoring Large Numbers with the TWIRL Device Adi Shamir, Eran Tromer Analysis of Bernstein’s.