UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL Departments and Centres

Up a level
Export as [feed] RSS 2.0 [feed] RSS 1.0 [feed] Atom
Group by: Author | Type
Jump to: A | D | E | K | L | P
Number of items: 13.

A

Alkassar, A; Andreeva, E; Lipmaa, H; (2006) SLC: Efficient Authenticated Encryption for Short Packets. In: Dittmann, J, (ed.) Lecture Notes in Informatics. (pp. 270 - 278). Gesellschaft für Informatik e.v.

D

Desmedt, Y.; Lange, T.; (2006) Pairing based threshold cryptography improving on Libert-Quisquater and Baek-Zheng. Financial Cryptography and Data Security , 4107 (2006) pp. 154-159. 10.1007/11889663_12.

E

Elkind, E; Lipmaa, H; (2006) Hybrid Voting Protocols and Hardness of Manipulation. In: (Proceedings) 1st International Workshop on Computational Social Choice. : Amsterdam.

K

Kacprzak, M.; Lomuscio, A.; Niewiadomski, A.; Penczek, W.; Raimondi, F.; Szreter, M.; (2006) Comparing BDD and SAT based techniques for model checking Chaum's Dining Cryptographers Protocol. Fundamenta Informaticae , 72 (1-3) pp. 215-234. Green open access
file

Käsper, E; Laur, L; Lipmaa, H; (2006) Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds. (IACR ePrint Archive 2006/356 ). IACR

L

Laur, S; Lipmaa, H; (2006) Consistent Adaptive Two-Party Computations. (IACR ePrint Archive ). IACR

Laur, S; Lipmaa, H; Mielikäinen, T; (2006) Cryptographically Private Support Vector Machines. In: (Proceedings) The Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006. (pp. 618 - 624). ACM: New York, NY, USA.

Laur, S; Lipmaa, H; Mielikäinen, T; (2006) Cryptographically Private Support Vector Machines. (IACR ePrint Archive 2006/198 , pp. 01 - 21 ). IACR

Laur, S.; Lipmaa, H.; Mielikainen, T.; (2006) Cryptographically private support vector machines. In: Eliassi-Rad, T. and Ungar, L. and Craven, M. and Gunopulos, D., (eds.) Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD 06). (pp. pp. 618-624). The Association for Computing Machinery: New York, US.

Lipmaa, H; (2006) Cryptographic Techniques in Privacy-Preserving Data Mining. In: Lecture Notes in Computer Science. Springer-Verlag

Lipmaa, H; Yung, M; Lin, D; (2006) Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006. Lecture Notes in Computer Science: Vol.4318. Springer-Verlag

Lomuscio, A.; Raimondi, F.; Wozna, B.; (2006) Verification of the TESLA protocol in MCMAS-X. In: Lindemann, G. and Schlingloff, H., (eds.) Proceedings of Concurrency, Specification and Programming (CS&P) 2006. (pp. pp. 255-267). Humboldt University Press: Wandlitz, Germany. Green open access
file

P

Pecheur, C.; Raimondi, F.; (2006) Symbolic model checking of logics with actions. In: Edelkamp, S. and Lomuscio, A., (eds.) Model Checking and Artifical Intelligence: 4th Workshop, MoChArt IV, Riva del garda, Italy, August 29, 2006, Revised Selected and Invited Papers. (pp. pp. 113-128). Springer Verlag: Berlin/ Heidelberg, Germany. Green open access
file

This list was generated on Sun Jul 27 03:07:46 2014 BST.