Bellare

Results: 43



#Item
31Errata for “Crowdsourcing Algorithms for Entity Resolution

Errata for “Crowdsourcing Algorithms for Entity Resolution" (PVLDB 7(12):[removed]Norases Vesdapunt Kedar Bellare

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-12-17 10:07:28
32Bibliography [1] W. Aiello, M. Bellare and R. Venkatesan. Knowledge on the Average { Perfect, Statistical and Logarithmic. In 27th ACM Symposium on the Theory of Computing, pages 469{478, [removed]W. Aiello and J. Hast

Bibliography [1] W. Aiello, M. Bellare and R. Venkatesan. Knowledge on the Average { Perfect, Statistical and Logarithmic. In 27th ACM Symposium on the Theory of Computing, pages 469{478, [removed]W. Aiello and J. Hast

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:25:12
33LOSSY Identity-based (Lossy) Trapdoor Functions and Applications  Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters

LOSSY Identity-based (Lossy) Trapdoor Functions and Applications Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-21 02:35:56
34DupLESS: Server-Aided Encryption for Deduplicated Storage∗ Mihir Bellare  Sriram Keelveedhi

DupLESS: Server-Aided Encryption for Deduplicated Storage∗ Mihir Bellare Sriram Keelveedhi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-02 21:51:23
35Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U

Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
36Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare  University of California San Diego, [removed]

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
37A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao1 , Lihua Liu2,∗

A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao1 , Lihua Liu2,∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-03 22:54:21
38Second Modes of Operation Workshop (August[removed]OCB Modes

Second Modes of Operation Workshop (August[removed]OCB Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:09:22
39

PDF Document

Add to Reading List

Source URL: mhrd.gov.in

Language: English - Date: 2012-02-17 02:50:04
40INVESTIGATION  PRICE: Software for the Targeted Assembly of Components of (Meta) Genomic Sequence Data J. Graham Ruby,*,†,1 Priya Bellare,†,‡,2 and Joseph L. DeRisi*,†

INVESTIGATION PRICE: Software for the Targeted Assembly of Components of (Meta) Genomic Sequence Data J. Graham Ruby,*,†,1 Priya Bellare,†,‡,2 and Joseph L. DeRisi*,†

Add to Reading List

Source URL: derisilab.ucsf.edu

Language: English - Date: 2013-10-30 16:40:15