UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL Departments and Centres

Up a level
Export as [feed] RSS 2.0 [feed] RSS 1.0 [feed] Atom
Group by: Author | Type
Jump to: B | C | E | G | L
Number of items: 16.

B

Burmester, M.; Desmedt, Y.; (2005) A secure and scalable group key exchange system. Information Processing Letters , 94 (3) pp. 137-143. 10.1016/j.ipl.2005.01.003.

C

Courtois, N.T.; (2005) General principles of algebraic attacks and new design criteria for cipher components. In: Dobbertin, H. and Rijmen, V. and Sowa, A., (eds.) Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers. (pp. pp. 67-83). Springer Verlag: Berlin/ Heidelberg, Germany.

E

Elkind, E; Lipmaa, H; (2005) Hybrid Voting Protocols and Hardness of Manipulation. In: (Proceedings) First Spain Italy Netherlands Meeting on Game Theory.

Elkind, E; Lipmaa, H; (2005) Hybrid Voting Protocols and Hardness of Manipulation. In: Deng, X and Du, D, (eds.) Lecture Notes in Computer Science. (pp. 206 - 215). Springer-Verlag

Elkind, E; Lipmaa, H; (2005) Small Coalitions Cannot Manipulate Voting. In: Patrick, A and Yung, M, (eds.) Lecture Notes in Computer Science. (pp. 285 - 297). Springer-Verlag

G

Gillies, M.; Robertson, D.; Ballin, D.; (2005) Direct Manipulation-like Tools for Designing Intelligent Virtual Agents. In: Intelligent Virtual Agents. (pp. pp. 430-441). Springer-Verlag: Berlin, Germany. Green open access
file

Gillies, M.; Vinayagamoorthy, V.; Robertson , D.; Steed, A.; (2005) A Platform Independent Architecture for Virtual Characters and Avatars. In: Intelligent Virtual Agents. (pp. p. 492). Springer-Verlag: Berlin / Heidelberg, Germany. Green open access
file

L

Laur, L; Lipmaa, H; Mielikäinen, T; (2005) Private Itemset Support Counting. In: Qing, S and Mao, W and Lopez, J and Wang, G, (eds.) Lecture Notes in Computer Science. (pp. 97 - 111). Springer-Verlag

Laur, S; Lipmaa, H; (2005) Additive Conditional Disclosure of Secrets And Applications. (IACR ePrint Archive ). IACR

Li, Y; Lipmaa, H; Pei, D; (2005) On Delegatability of Four Designated Verifier Signatures. In: Qing, S and Mao, W and Lopez, J and Wang, G, (eds.) Lecture Notes in Computer Science. (pp. 61 - 71). Springer-Verlag

Lipmaa, H; (2005) An Oblivious Transfer Protocol with Log-Squared Communication. In: (Proceedings) The Past, Present and Future of Oblivious Transfer, Satellite workshop of the Fifth Haifa Workshop on Interdisciplinary Applications of Graph theory, Combinatorics, and Algorithms.

Lipmaa, H; (2005) Labor. UNSPECIFIED

Lipmaa, H; (2005) Secure Electronic Voting Protocols. In: Bidgoli, H, (ed.) The Handbook of Information Security. Wiley

Lipmaa, H; (2005) An Oblivious Transfer Protocol with Log-Squared Communication. In: Zhou, J and Lopez, J, (eds.) Lecture Notes in Computer Science. (pp. 314 - 328). Springer-Verlag

Lipmaa, H; Wang, G; Bao, F; (2005) Designated Verifier Signature Schemes: Attacks, New Security Notions and A New Construction. In: Caires, L and Italiano, GF and Monteiro, L and Palamidessi, C and Yung, M, (eds.) Lecture Notes in Computer Science. (pp. 459 - 471). Springer-Verlag: Berlin / Heidelberg.

Lipmaa, H.; Wang, G.; Bao, F.; (2005) Designated verifier signature schemes: attacks, new security notions and a new construction. In: Caires, L. and Italiano, G.F. and Monteiro, L. and Palamidessi, C. and Yung, M., (eds.) Automata, Languages and Programming: 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005. Proceedings. (pp. pp. 459-471). Springer Verlag: Berlin/ Heidelberg, Germany.

This list was generated on Sun Aug 17 02:48:01 2014 BST.