Cited By
View all- Ling SPhan DStehlé DSteinfeld R(2017)Hardness of k-LWE and Applications in Traitor TracingAlgorithmica10.1007/s00453-016-0251-779:4(1318-1352)Online publication date: 1-Dec-2017
- Kiayias ATang QSadeghi AGligor VYung M(2013)How to keep a secretProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516691(943-954)Online publication date: 4-Nov-2013
- Nematzadeh ACamp L(2010)Threat analysis of online health information systemProceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments10.1145/1839294.1839331(1-7)Online publication date: 23-Jun-2010
- Show More Cited By