Molva

Results: 12



#Item
1

Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:25:23
    2

    BLÁLONGA Molva dypterygia Felags fiskastovnur Gagnfiskur Botnfiskur

    Add to Reading List

    Source URL: www.hav.fo

    Language: Norwegian - Date: 2018-06-18 05:34:26
      3Cryptography / Error detection and correction / Hash function / Radio-frequency identification / Cryptographic hash function

      Proceedings - NN - Analysing the Molva and Di Pietro Private RFID Authentication Scheme

      Add to Reading List

      Source URL: events.iaik.tugraz.at

      Language: English - Date: 2008-07-17 01:38:30
      4Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Computer access control / Cryptography / Molva / Authentication / Identification / Humancomputer interaction / Security

      The Molva - Di Pietro scheme Problems with the identification Design flaws

      Add to Reading List

      Source URL: events.iaik.tugraz.at

      Language: English - Date: 2008-07-10 03:06:40
      5Internet privacy

      Multi-User Searchable Encryption in the Cloud Cédric Van Rompay, Refik Molva, and Melek Önen ISC 2015 th September 10 , 2015 | Trondheim, Norway

      Add to Reading List

      Source URL: isc2015.item.ntnu.no

      Language: English - Date: 2015-09-19 12:54:02
        6

        Online-Offline Homomorphic Signatures for Polynomial Functions ¨ Kaoutar Elkhiyaoui, Melek Onen, and Refik Molva EURECOM, Sophia Antipolis, France

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-09-30 13:33:57
          7Lotidae / Fishing in Scotland / Cod / Seafood / Common ling / Sea Fish Industry Authority / Demersal fish / Fish / Gadidae / Fisheries

          Species guide January 2014 v4 Ling Stock assessment and catches Molva molva © Scandanavian Fishing Year Book

          Add to Reading List

          Source URL: www.seafish.org.uk

          Language: English - Date: 2014-02-03 08:07:45
          8Public-key cryptography / Adaptive chosen-ciphertext attack / Elliptic curve cryptography / Diffie–Hellman problem / Advantage / Chosen-ciphertext attack / Cipher / Key encapsulation / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Ciphertext indistinguishability

          Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

          Add to Reading List

          Source URL: www.bmoeller.de

          Language: English - Date: 2006-01-02 00:25:23
          9UNI / Telecommunications engineering / Technology / Live / Radio-frequency identification

          ROTIV: RFID Ownership Transfer with Issuer Verification Kaoutar Elkhiyaoui, Erik-Oliver Blass, and Refik Molva Eurecom, Sophia-Antipolis, France Email: {kaoutar.elkhiyaoui, erik-oliver.blass, refik.molva}@eurecom.fr

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2011-06-09 06:14:59
          UPDATE