Privately and Publicly Verifiable Computing Techniques More Books Like This

Theory of Cryptography Theory of Cryptography
2016
Security and Cryptography for Networks Security and Cryptography for Networks
2016
Information Security Practice and Experience Information Security Practice and Experience
2011
Information Security Information Security
2018
Provable Security Provable Security
2017
Information Security Information Security
2007
Advances in Cryptology – CRYPTO 2016 Advances in Cryptology – CRYPTO 2016
2016
Security and Cryptography for Networks Security and Cryptography for Networks
2022
Codes, Cryptology and Information Security Codes, Cryptology and Information Security
2019
Provable Security Provable Security
2015
Advances in Cryptology – ASIACRYPT 2016 Advances in Cryptology – ASIACRYPT 2016
2016
Public-Key Cryptography – PKC 2016 Public-Key Cryptography – PKC 2016
2016
Cryptography and Information Security in the Balkans Cryptography and Information Security in the Balkans
2016
Applied Cryptography and Network Security Applied Cryptography and Network Security
2010
Provable and Practical Security Provable and Practical Security
2022