Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Nguyen, Lan
Safavi-Naini, Rei
and
Kurosawa, Kaoru
2004.
Applied Cryptography and Network Security.
Vol. 3089,
Issue. ,
p.
61.
Dodis, Y.
Shien Jin Ong
Prabhakaran, M.
and
Sahai, A.
2004.
On the (Im)possibility of Cryptography with Imperfect Randomness.
p.
196.
Rogaway, Phillip
2004.
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making.
Vol. 3321,
Issue. ,
p.
13.
Brinkman, Richard
Doumen, Jeroen
and
Jonker, Willem
2004.
Secure Data Management.
Vol. 3178,
Issue. ,
p.
18.
Vaidya, J.
and
Clifton, C.
2004.
Privacy-Preserving Outlier Detection.
p.
233.
Möller, Bodo
2004.
Computer Security – ESORICS 2004.
Vol. 3193,
Issue. ,
p.
335.
Blake, Ian F.
and
Kolesnikov, Vladimir
2004.
Advances in Cryptology - ASIACRYPT 2004.
Vol. 3329,
Issue. ,
p.
515.
Kantarcıoǧlu, Murat
and
Clifton, Chris
2004.
Knowledge Discovery in Databases: PKDD 2004.
Vol. 3202,
Issue. ,
p.
279.
Abdalla, Michel
Bellare, Mihir
Catalano, Dario
Kiltz, Eike
Kohno, Tadayoshi
Lange, Tanja
Malone-Lee, John
Neven, Gregory
Paillier, Pascal
and
Shi, Haixia
2005.
Advances in Cryptology – CRYPTO 2005.
Vol. 3621,
Issue. ,
p.
205.
Brickell, Justin
and
Shmatikov, Vitaly
2005.
Advances in Cryptology - ASIACRYPT 2005.
Vol. 3788,
Issue. ,
p.
236.
Kiltz, Eike
Leander, Gregor
and
Malone-Lee, John
2005.
Theory of Cryptography.
Vol. 3378,
Issue. ,
p.
283.
Goldwasser, S.
and
Kalai, Y.T.
2005.
On the Impossibility of Obfuscation with Auxiliary Input.
p.
553.
Frikken, Keith
and
Atallah, Mikhail
2005.
Financial Cryptography and Data Security.
Vol. 3570,
Issue. ,
p.
270.
Chiang, Yi-Ting
Wang, Da-Wei
Liau, Churn-Jung
and
Hsu, Tsan-sheng
2005.
Data and Applications Security XIX.
Vol. 3654,
Issue. ,
p.
114.
Kantarcıoǧlu, Murat
and
Clifton, Chris
2005.
Data and Applications Security XIX.
Vol. 3654,
Issue. ,
p.
325.
Jiang, Wei
and
Clifton, Chris
2005.
Data and Applications Security XIX.
Vol. 3654,
Issue. ,
p.
166.
Barak, B.
and
Sahai, A.
2005.
How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation.
p.
542.
Boneh, Dan
Goh, Eu-Jin
and
Nissim, Kobbi
2005.
Theory of Cryptography.
Vol. 3378,
Issue. ,
p.
325.
Barak, Boaz
Canetti, Ran
Lindell, Yehuda
Pass, Rafael
and
Rabin, Tal
2005.
Advances in Cryptology – CRYPTO 2005.
Vol. 3621,
Issue. ,
p.
361.
Gupta, Prateek
and
Shmatikov, Vitaly
2005.
Towards computationally sound symbolic analysis of key exchange protocols.
p.
23.