Showing
1 - 9
results of
9
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Tartary, Christophe
Search Results - Tartary, Christophe
Showing
1 - 9
results of
9
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
Graph Coloring Applied to Secure Computation in Non-Abelian Groups
by
Desmedt, Yvo
,
Pieprzyk, Josef
,
Steinfeld, Ron
,
Sun, Xiaoming
,
Tartary, Christophe
,
Wang, Huaxiong
,
Yao, Andrew Chi-Chih
Published in
Journal of cryptology
Get full text
Items that this one cites
Article
Save to List
Saved in:
2
Loading…
Authentication of Digital Streams
by
Tartary, Christophe
,
Huaxiong Wang
,
San Ling
Published in
IEEE transactions on information theory
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
3
Loading…
AN EFFICIENT AND INFORMATION THEORETICALLY SECURE RATIONAL SECRET SHARING SCHEME BASED ON SYMMETRIC BIVARIATE POLYNOMIALS
by
TARTARY, CHRISTOPHE
,
WANG, HUAXIONG
,
ZHANG, YUN
Published in
International journal of foundations of computer science
Get full text
Items that this one cites
Article
Save to List
Saved in:
4
Loading…
A Practical Framework for [Formula Omitted]-Out-of-[Formula Omitted] Oblivious Transfer With Security Against Covert Adversaries
by
Zeng, Bing
,
Tartary, Christophe
,
Xu, Peng
,
Jing, Jiandu
,
Tang, Xueming
Published in
IEEE transactions on information forensics and security
Get full text
Article
Save to List
Saved in:
5
Loading…
A Practical Framework for t-Out-of- n Oblivious Transfer With Security Against Covert Adversaries
by
Bing Zeng
,
Tartary, Christophe
,
Peng Xu
,
Jiandu Jing
,
Xueming Tang
Published in
IEEE transactions on information forensics and security
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
6
Loading…
Bounds and trade-offs for Double-Base Number Systems
by
Lou, Tiancheng
,
Sun, Xiaoming
,
Tartary, Christophe
Published in
Information processing letters
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
7
Loading…
A coding approach to the multicast stream authentication problem
by
Tartary, Christophe
,
Wang, Huaxiong
,
Pieprzyk, Josef
Published in
International journal of information security
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
8
Loading…
Privacy-Preserving Distributed Set Intersection
by
Qingsong Ye
Request full text
Conference Proceeding
Save to List
Saved in:
9
Loading…
Early assessment of diffusion and possible expansion of SARS-CoV-2 Lineage 20I/501Y.V1 (B.1.1.7, variant of concern 202012/01) in France, January to March 2021
by
Gaymard, Alexandre
,
Bosetti, Paolo
,
Feri, Adeline
,
Destras, Gregory
,
Enouf, Vincent
,
Andronico, Alessio
,
Burrel, Sonia
,
Behillil, Sylvie
,
Sauvage, Claire
,
Bal, Antonin
,
Morfin, Florence
,
Van Der Werf, Sylvie
,
Josset, Laurence
,
Blanquart, François
,
Coignard, Bruno
,
Cauchemez, Simon
,
Lina, Bruno
Published in
Euro surveillance : bulletin européen sur les maladies transmissibles
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
8 results
8
Full Text
9 results
9
Format
Articles
8 results
8
Conference Proceedings
1 results
1
Journal Title
Ieee Transactions On Information Forensics And Security
2 results
2
Euro Surveillance : Bulletin Européen Sur Les Maladies Transmissibles
1 results
1
Euro Surveillance/Eurosurveillance
1 results
1
Eurosurveillance
1 results
1
Ieee Transactions On Information Theory
1 results
1
Information Processing Letters
1 results
1
International Journal Of Foundations Of Computer Science
1 results
1
International Journal Of Information Security
1 results
1
Journal Of Cryptology
1 results
1
Subjects
Science & Technology
8 results
8
Computer Science
7 results
7
Technology
7 results
7
Computer Science, Theory & Methods
5 results
5
Cryptography
5 results
5
Engineering
4 results
4
Engineering, Electrical & Electronic
4 results
4
Applied Sciences
3 results
3
Computer Science, Information Systems
3 results
3
Exact Sciences And Technology
3 results
3
Protocol
3 results
3
Authentication Protocols
2 results
2
Coding And Information Theory
2 results
2
Communication
2 results
2
Communications Engineering
2 results
2
Computation
2 results
2
Computer Information Security
2 results
2
Information, Signal And Communications Theory
2 results
2
Mathematics
2 results
2
Networks
2 results
2
Year of Publication
From:
To:
Source
Ieee Xplore (Online Service)
3 results
3
Ieee Xplore All Journals
3 results
3
Springer Nature
2 results
2
Springer Journals
2 results
2
Ieee Electronic Library (Iel) Conference Proceedings
1 results
1
Business Source Ultimate
1 results
1
Social Science Premium Collection
1 results
1
Criminology Collection
1 results
1
Sciencedirect®
1 results
1
Freely Accessible Journals
1 results
1
Elsevier
1 results
1
Eu Bookshop
1 results
1
Doaj Directory Of Open Access Journals
1 results
1
Ingentaconnect Journals
1 results
1
Abi/Inform Global
1 results
1
Criminal Justice Database
1 results
1
Road: Directory Of Open Access Scholarly Resources
1 results
1
Ezb Electronic Journals Library
1 results
1
Springerlink 过刊(Nstl购买)
1 results
1
Pubmed Central
1 results
1