CS-Cipher

Results: 180



#Item
21PerK: Personalized Keyword Search in Relational Databases through Preferences Kostas Stefanidis Marina Drosou

PerK: Personalized Keyword Search in Relational Databases through Preferences Kostas Stefanidis Marina Drosou

Add to Reading List

Source URL: www.cs.uoi.gr

Language: English - Date: 2012-09-27 06:19:27
22The center stable matchings and the centers of cover graphs of distributive lattices Christine T. Cheng∗ Eric McDermid†

The center stable matchings and the centers of cover graphs of distributive lattices Christine T. Cheng∗ Eric McDermid†

Add to Reading List

Source URL: www.cs.uwm.edu

Language: English - Date: 2011-04-27 11:40:36
23FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

FPE Synopsis / Draft 3. This note is a survey of format-preserving encryption (FPE). It aims to explain FPE in an accessible but precise way. The current version has evolved, along with my understanding of FPE, since Jun

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:47:37
24AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara   Ted Krovetz

AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2015-10-15 15:27:48
25Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:49:00
26Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:50:20
27The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-06-30 10:38:30
28Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-03-17 15:01:03
29THE  UNIVERSITY T U C S C) N.

THE UNIVERSITY T U C S C) N.

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2009-05-25 01:07:43
30Towards Scalable Location-aware Services: Requirements and Research Issues Mohamed F. Mokbel Walid G. Aref

Towards Scalable Location-aware Services: Requirements and Research Issues Mohamed F. Mokbel Walid G. Aref

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:39