Large result sets may take several minutes to download.
The first row is header row.
Generation of CSV export files is restricted, and may be rejected during busy periods. If this happens then please wait and try again after a brief interval.
Bootle J
(2015)
Short Accountable Ring Signatures Based on DDH
in Computer Security -- ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I
Longo J
(2014)
Simulatable Leakage: Analysis, Pitfalls, and New Constructions
in Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I
Abramsky S
(2015)
Contextuality, Cohomology and Paradox
in 24th EACSL Annual Conference on Computer Science Logic, CSL 2015,
September 7-10, 2015, Berlin, Germany