Index file section A for ijact.bib
Last update: Sun Jan 6 02:01:01 MST 2019
Return to index directory
A
-
ABE, 3(4)363--376
-
Abe, Masayuki, 2(3)229--249
-
Abe:2012:FUC, 2(3)229--249
-
access, 1(3)169--180, 3(4)394--406
-
Achieving, 2(1)3--12
-
active, 1(2)79--90
-
advanced, 1(3)169--180, 3(2)181--194
-
adversary, 1(2)79--90, 1(3)200--224
-
AES, 1(4)264--289, 3(3)225--235
-
against, 1(1)32--46, 1(2)79--90, 1(2)91--107, 2(1)23--34
-
Agrawal, Megha, 3(3)236--261
-
Agrawal:2017:NAE, 3(3)236--261
-
agreement, 1(3)236--250, 2(2)154--158
-
algebraic, 1(4)264--289
-
Ali, Syed Taqi, 3(2)148--165
-
Ali:2014:DAB, 3(2)148--165
-
ALPHA--MAC, 1(4)264--289
-
Amberker, B. B., 3(2)148--165
-
Amberker, B. B., see Ali, Syed Taqi
-
analysis, 1(2)144--159, 1(3)169--180, 1(4)320--322, 2(2)83--99,
2(2)121--138, 3(2)97--115
-
and-prove, commit-, 3(4)344--362
-
Anonymous, 1(2)79--90
-
APOP, 1(1)32--46
-
application, 1(4)264--289, 2(4)322--359, 3(1)21--46
-
approach, 3(2)97--115
-
arbitrary, 3(3)262--287
-
Asiacrypt, 1(4)320--322
-
aspect, 2(2)121--138
-
assumption, 3(1)47--83, 3(3)210--224
-
asymmetric, 3(3)262--287
-
Ateniese, Giuseppe, 1(4)320--322
-
Ateniese:2009:RAO, 1(4)320--322
-
attack, 1(1)32--46, 1(2)91--107, 1(3)161--168, 2(1)13--22, 2(1)23--34,
2(2)83--99, 3(2)97--115, 3(2)181--194, 3(3)225--235, 3(4)377--393
-
attribute-based, 2(1)46--59, 2(3)199--211, 2(3)250--270, 3(2)148--165,
3(4)363--376
-
auctions, 1(4)323--324
-
auditing, 3(3)196--209
-
authenticated, 3(3)236--261, 3(4)377--393
-
authentication, 1(1)32--46, 1(2)79--90, 1(3)169--180, 1(4)290--308
-
authenticity, 3(3)236--261
-
authorisation, 2(4)304--321
-
automata, 3(3)225--235
-
automatic, 2(2)83--99
-
aware, User-, 1(4)290--308