×

Found 93 Documents (Results 1–93)

Public key based searchable encryption with fine-grained sender permission control. (English) Zbl 1511.94158

Huang, Qiong (ed.) et al., Provable and practical security. 15th international conference, ProvSec 2021, Guangzhou, China, November 5–8, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13059, 3-18 (2021).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A lattice-based approach to privacy-preserving biometric authentication without relying on trusted third parties. (English) Zbl 1506.94085

Liu, Joseph K. (ed.) et al., Information security practice and experience. 13th international conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10701, 297-319 (2017).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Privacy-preserving fingerprint authentication resistant to hill-climbing attacks. (English) Zbl 1396.94105

Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 44-64 (2016).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

A subnormal Toeplitz completion problem. (English) Zbl 1327.47025

Ball, Joseph A. (ed.) et al., Operator theory in harmonic and non-commutative analysis. 23rd international workshop in operator theory and its applications, IWOTA, Sydney, Australia, July 16–20, 2012. Cham: Birkhäuser/Springer (ISBN 978-3-319-06265-5/hbk; 978-3-319-06266-2/ebook). Operator Theory: Advances and Applications 240, 87-110 (2014).
MSC:  47B35 47B20 47-02
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software