Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Rogaway, Phillip
2004.
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making.
Vol. 3321,
Issue. ,
p.
13.
Blake, Ian F.
and
Kolesnikov, Vladimir
2004.
Advances in Cryptology - ASIACRYPT 2004.
Vol. 3329,
Issue. ,
p.
515.
Nguyen, Lan
Safavi-Naini, Rei
and
Kurosawa, Kaoru
2004.
Applied Cryptography and Network Security.
Vol. 3089,
Issue. ,
p.
61.
Kantarcıoǧlu, Murat
and
Clifton, Chris
2004.
Knowledge Discovery in Databases: PKDD 2004.
Vol. 3202,
Issue. ,
p.
279.
Vaidya, J.
and
Clifton, C.
2004.
Privacy-Preserving Outlier Detection.
p.
233.
Dodis, Y.
Shien Jin Ong
Prabhakaran, M.
and
Sahai, A.
2004.
On the (Im)possibility of Cryptography with Imperfect Randomness.
p.
196.
Brinkman, Richard
Doumen, Jeroen
and
Jonker, Willem
2004.
Secure Data Management.
Vol. 3178,
Issue. ,
p.
18.
Möller, Bodo
2004.
Computer Security – ESORICS 2004.
Vol. 3193,
Issue. ,
p.
335.
Brickell, Justin
and
Shmatikov, Vitaly
2005.
Advances in Cryptology - ASIACRYPT 2005.
Vol. 3788,
Issue. ,
p.
236.
Boneh, Dan
Goh, Eu-Jin
and
Nissim, Kobbi
2005.
Theory of Cryptography.
Vol. 3378,
Issue. ,
p.
325.
Kiltz, Eike
Leander, Gregor
and
Malone-Lee, John
2005.
Theory of Cryptography.
Vol. 3378,
Issue. ,
p.
283.
Kantarcıoǧlu, Murat
and
Clifton, Chris
2005.
Data and Applications Security XIX.
Vol. 3654,
Issue. ,
p.
325.
Frikken, Keith
and
Atallah, Mikhail
2005.
Financial Cryptography and Data Security.
Vol. 3570,
Issue. ,
p.
270.
Gupta, Prateek
and
Shmatikov, Vitaly
2005.
Towards computationally sound symbolic analysis of key exchange protocols.
p.
23.
Chiang, Yi-Ting
Wang, Da-Wei
Liau, Churn-Jung
and
Hsu, Tsan-sheng
2005.
Data and Applications Security XIX.
Vol. 3654,
Issue. ,
p.
114.
Goldwasser, S.
and
Kalai, Y.T.
2005.
On the Impossibility of Obfuscation with Auxiliary Input.
p.
553.
Barak, Boaz
Canetti, Ran
Lindell, Yehuda
Pass, Rafael
and
Rabin, Tal
2005.
Advances in Cryptology – CRYPTO 2005.
Vol. 3621,
Issue. ,
p.
361.
Barak, B.
and
Sahai, A.
2005.
How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation.
p.
542.
Jiang, Wei
and
Clifton, Chris
2005.
Data and Applications Security XIX.
Vol. 3654,
Issue. ,
p.
166.
Motro, Amihai
and
Parisi-Presicce, Francesco
2005.
Data and Applications Security XIX.
Vol. 3654,
Issue. ,
p.
338.