Privately and Publicly Verifiable Computing Techniques More Books Like This
Theory of Cryptography
2016
Security and Cryptography for Networks
2016
Information Security Practice and Experience
2011
Information Security
2018
Provable Security
2017
Information Security
2007
Advances in Cryptology – CRYPTO 2016
2016
Security and Cryptography for Networks
2022
Codes, Cryptology and Information Security
2019
Provable Security
2015
Advances in Cryptology – ASIACRYPT 2016
2016
Public-Key Cryptography – PKC 2016
2016
Cryptography and Information Security in the Balkans
2016
Applied Cryptography and Network Security
2010
Provable and Practical Security
2022