Showing results 16 to 19 of 19
< previous
Title | Author(s) | Issue Date | |
---|---|---|---|
Secure chained threshold proxy signature without and with supervision Journal:Journal of Software Engineering and Applications | 2009 | ||
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM Proceeding/Conference:Proceeding-SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing | 2017 | ||
Secure end-to-end browsing system with mobile composition Proceeding/Conference:International Conference on Internet Technology and Applications (iTAP) | 2011 | ||
SPECS: Secure and privacy enhancing communications schemes for VANETs Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | 2010 |