Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
40
views
11
references
Top references
cited by
20
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,456
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Security and Cryptography for Networks
Constant-Size Dynamic k-TAA
other
Author(s):
Man Ho Au
,
Willy Susilo
,
Yi Mu
Publication date
(Print):
2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The Dynamic Brain
Most cited references
11
Record
: found
Abstract
: not found
Book Chapter
: not found
Short Signatures from the Weil Pairing
Dan Boneh
,
Ben Lynn
,
Hovav Shacham
(2001)
0
comments
Cited
203
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Short Signatures Without Random Oracles
Dan Boneh
,
Xavier Boyen
(2004)
0
comments
Cited
133
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Efficient Proofs that a Committed Number Lies in an Interval
Fabrice Boudot
(2000)
0
comments
Cited
48
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2006
Pages
: 111-125
DOI:
10.1007/11832072_8
SO-VID:
5dbbe00a-c730-44cb-a68d-609eb6ded1b0
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 78
Understanding Two-Round Differentials in AES
pp. 111
Constant-Size Dynamic k-TAA
pp. 242
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
pp. 348
An Improved LPN Algorithm
Similar content
3,456
Are the leukocyte telomere length attrition and telomerase activity alteration potential predictor biomarkers for sporadic TAA in aged individuals?
Authors:
Carmela R. Balistreri
,
Calogera Pisano
,
Adriana Martorana
…
Enhancing immune responses of ESC-based TAA cancer vaccines with a novel OMV delivery system
Authors:
Meiling Jin
,
Da Huo
,
Jingjing Sun
…
Topological surface states and Fermi arcs of the noncentrosymmetric Weyl semimetals TaAs, TaP, NbAs, and NbP
Authors:
,
,
See all similar
Cited by
20
Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things
Authors:
Meng Li
,
Donghui Hu
,
Chhagan Lal
…
A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid
Authors:
Yanmin Gong
,
Ying Cai
,
Yuanxiong Guo
…
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Authors:
Jan Camenisch
,
Markulf Kohlweiss
,
Claudio Soriente
See all cited by