Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Brinkman, Richard
Doumen, Jeroen
and
Jonker, Willem
2004.
Secure Data Management.
Vol. 3178,
Issue. ,
p.
18.
Dodis, Y.
Shien Jin Ong
Prabhakaran, M.
and
Sahai, A.
2004.
On the (Im)possibility of Cryptography with Imperfect Randomness.
p.
196.
Nguyen, Lan
Safavi-Naini, Rei
and
Kurosawa, Kaoru
2004.
Applied Cryptography and Network Security.
Vol. 3089,
Issue. ,
p.
61.
Kantarcıoǧlu, Murat
and
Clifton, Chris
2004.
Knowledge Discovery in Databases: PKDD 2004.
Vol. 3202,
Issue. ,
p.
279.
Blake, Ian F.
and
Kolesnikov, Vladimir
2004.
Advances in Cryptology - ASIACRYPT 2004.
Vol. 3329,
Issue. ,
p.
515.
Möller, Bodo
2004.
Computer Security – ESORICS 2004.
Vol. 3193,
Issue. ,
p.
335.
Rogaway, Phillip
2004.
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making.
Vol. 3321,
Issue. ,
p.
13.
Vaidya, J.
and
Clifton, C.
2004.
Privacy-Preserving Outlier Detection.
p.
233.
Frikken, Keith
and
Atallah, Mikhail
2005.
Financial Cryptography and Data Security.
Vol. 3570,
Issue. ,
p.
270.
Boneh, Dan
Goh, Eu-Jin
and
Nissim, Kobbi
2005.
Theory of Cryptography.
Vol. 3378,
Issue. ,
p.
325.
Kiltz, Eike
Leander, Gregor
and
Malone-Lee, John
2005.
Theory of Cryptography.
Vol. 3378,
Issue. ,
p.
283.
Kantarcıoǧlu, Murat
and
Clifton, Chris
2005.
Data and Applications Security XIX.
Vol. 3654,
Issue. ,
p.
325.
Goldwasser, S.
and
Kalai, Y.T.
2005.
On the Impossibility of Obfuscation with Auxiliary Input.
p.
553.
Gupta, Prateek
and
Shmatikov, Vitaly
2005.
Towards computationally sound symbolic analysis of key exchange protocols.
p.
23.
Abdalla, Michel
Bellare, Mihir
Catalano, Dario
Kiltz, Eike
Kohno, Tadayoshi
Lange, Tanja
Malone-Lee, John
Neven, Gregory
Paillier, Pascal
and
Shi, Haixia
2005.
Advances in Cryptology – CRYPTO 2005.
Vol. 3621,
Issue. ,
p.
205.
Brickell, Justin
and
Shmatikov, Vitaly
2005.
Advances in Cryptology - ASIACRYPT 2005.
Vol. 3788,
Issue. ,
p.
236.
Jiang, Wei
and
Clifton, Chris
2005.
Data and Applications Security XIX.
Vol. 3654,
Issue. ,
p.
166.
Li, Ninghui
Du, Wenliang
and
Boneh, Dan
2005.
Oblivious signature-based envelope.
Distributed Computing,
Vol. 17,
Issue. 4,
p.
293.
Barak, Boaz
Canetti, Ran
Lindell, Yehuda
Pass, Rafael
and
Rabin, Tal
2005.
Advances in Cryptology – CRYPTO 2005.
Vol. 3621,
Issue. ,
p.
361.
Chiang, Yi-Ting
Wang, Da-Wei
Liau, Churn-Jung
and
Hsu, Tsan-sheng
2005.
Data and Applications Security XIX.
Vol. 3654,
Issue. ,
p.
114.