21 – 24 of 24
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- « previous
- 1
- 2
- 3
- next »
- 2018
-
Mark
Practical Attacks on Relational Databases Protected via Searchable Encryption
2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
Bootstrapping trust in software defined networks
(
- Contribution to journal › Article
-
Mark
Searchable Encrypted Relational Databases: Risks and Countermeasures
(
- Contribution to specialist publication or newspaper › Specialist publication article
- 1994
-
Mark
Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol
1994) 14th annual cryptographic conference CRYPTO '94 In Lecture Notes in Computer Science 839. p.121-128(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- « previous
- 1
- 2
- 3
- next »