يعرض 1 - 20 نتائج من 28 نتيجة بحث عن '"Luisa Siniscalchi"', وقت الاستعلام: 0.50s تنقيح النتائج
  1. 1
    Academic Journal
  2. 2
  3. 3
  4. 4
    Electronic Resource
  5. 5

    المصدر: Blundo, C, Cimato, S & Siniscalchi, L 2023, ' Heuristics for constrained role mining in the post-processing framework ', Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 8, pp. 9925-9937 . https://doi.org/10.1007/s12652-021-03648-1

  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    المصدر: Advances in Cryptology – CRYPTO 2021-41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II
    Lecture Notes in Computer Science
    Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2021
    Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842444
    CRYPTO (2)

  11. 11
  12. 12

    المساهمون: Garay, Juan A.

    المصدر: Scafuro, A, Siniscalchi, L & Visconti, I 2021, Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains . in J A Garay (ed.), Public-Key Cryptography – PKC 2021 : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II . Springer Science and Business Media Deutschland GmbH, Lecture Notes in Computer Science, vol. LNCS 12711, pp. 469-498, 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, Virtual, Online, 10/05/2021 . https://doi.org/10.1007/978-3-030-75248-4_17
    Lecture Notes in Computer Science
    Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2021
    Public-Key Cryptography – PKC 2021 ISBN: 9783030752477
    Public Key Cryptography (2)
    Public-Key Cryptography – PKC 2021-24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II

  13. 13
  14. 14
  15. 15
    Conference

    المساهمون: Reisman, Sorel, Iqbal Ahamed, Sheikh, Demartini, Claudio, Blundo, Carlo, Cimato, Stelvio, Siniscalchi, Luisa

    Relation: info:eu-repo/semantics/altIdentifier/isbn/978-1-5386-0367-3; info:eu-repo/semantics/altIdentifier/isbn/978-1-5386-0368-0; info:eu-repo/semantics/altIdentifier/wos/WOS:000424861900026; ispartofbook:41st IEEE Annual Computer Software and Applications Conference (COMPSAC); 41st IEEE Annual Computer Software and Applications Conference (COMPSAC); volume:2; firstpage:149; lastpage:154; numberofpages:6; http://hdl.handle.net/11386/4700576; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85032869326

  16. 16

    المساهمون: Beimel, Amos, Dziembowski, Stefan

    المصدر: Damgård, I, Kazana, T, Obremski, M, Raj, V & Siniscalchi, L 2018, Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments . in A Beimel & S Dziembowski (eds), Theory of Cryptography . vol. 11240, Springer VS, Cham, Lecture Notes in Computer Science (LNCS), no. 11240, pp. 225-254, Theory of Cryptography Conference, Goa, India, 11/11/2018 . https://doi.org/10.1007/978-3-030-03810-6_9
    Theory of Cryptography ISBN: 9783030038090
    TCC (2)
    Lecture Notes in Computer Science
    Lecture Notes in Computer Science-Theory of Cryptography
    Theory of Cryptography-16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II

  17. 17
  18. 18

    المساهمون: Kalai, Yael, Reyzin, Leonid

    المصدر: Theory of Cryptography ISBN: 9783319704999
    TCC (1)
    Ciampi, M, Ostrovsky, R, Siniscalchi, L & Visconti, I 2017, Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds . in Y Kalai & L Reyzin (eds), Theory of Cryptography . Lecture Notes in Computer Science, vol. 10677, Springer International Publishing AG, Cham, pp. 711-742, 15th Theory of Cryptography Conference, Baltimore, United States, 12/11/15 . https://doi.org/10.1007/978-3-319-70500-2_24

    وصف الملف: application/pdf

  19. 19

    المساهمون: Kalai, Yael, Reyzin, Leonid

    المصدر: Theory of Cryptography ISBN: 9783319704999
    TCC (1)
    Ciampi, M, Ostrovsky, R, Siniscalchi, L & Visconti, I 2017, Round-Optimal Secure Two-Party Computation from Trapdoor Permutations . in Y Kalai & L Reyzin (eds), Theory of Cryptography . Lecture Notes in Computer Science, vol. 10677, Springer International Publishing AG, Cham, pp. 678-710, 15th Theory of Cryptography Conference, Baltimore, United States, 12/11/15 . https://doi.org/10.1007/978-3-319-70500-2_23

    وصف الملف: application/pdf

  20. 20