Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Encyclopedia of Cryptography and Security

The Encyclopedia of Cryptography and Security is a comprehensive work on Cryptography for both information security professionals and experts in the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Abstract Privacy-enhancing technologies (PETs) belong to a class of technical measures which aim at preserving the privacy of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2014
2014
Access limitations are restrictions in the way in which the tuples of a relation can be accessed. Under access limitations, query… Expand
Review
2011
Review
2011
  • C. Cachin
  • Encyclopedia of Cryptography and Security
  • 2011
  • Corpus ID: 2955773
Steganography is the art and science of hiding information b y embedding messages within other, seemingly harmless messages… Expand
2008
2008
Computational complexity theory is the study of the minimal resources needed to solve computational problems. In particular, it… Expand
  • figure 4.1
Highly Cited
2005
Highly Cited
2005
 
Review
2005
Review
2005
Expanded into two volumes, the Second Edition of Springers Encyclopedia of Cryptography and Security brings the latest and most… Expand
2005
2005
Of course, from childhood to forever, we are always thought to love reading. It is not only reading the lesson book but also… Expand
  • table 2
  • table 3
  • table 4
  • figure 7
  • figure 6
2005