Index file section S for ijact.bib
Last update: Sun Jan 6 02:01:01 MST 2019
Return to index directory
S
-
Safavi-Naini, Reihaneh, 2(3)250--270
-
Safavi-Naini, Reihaneh, see Hinek, M. Jason
-
Saha, Dhiman, 3(3)225--235
-
Saha, Dhiman, see Ghosh, Shamit
-
Sakai, Yusuke, 3(4)394--406
-
Sakai, Yusuke, see Nakagawa, Sanami
-
Sanadhya, Somitra Kumar, 3(3)236--261, 3(3)262--287
-
Sanadhya, Somitra Kumar, see Agrawal, Megha,
see Bansal, Tarun Kumar
-
Sarkar, Palash, 3(1)47--83
-
Sarkar, Palash, see Chatterjee, Sanjit
-
Sarr, Augustin P., 3(4)377--393
-
Sarr:2017:SBF, 3(4)377--393
-
Sato, Chifumi, 2(1)35--45
-
Sato:2010:SUI, 2(1)35--45
-
SCasc, 3(3)210--224
-
scheme, 1(2)120--132, 1(2)133--143, 1(4)320--322, 2(1)46--59, 3(1)84--96,
3(3)196--209
-
schemes, 1(1)60--69, 2(4)304--321, 3(1)47--83, 3(3)288--311
-
Schwenk, Jörg, 1(4)290--308, see Gajek, Sebastian
-
Seberry, Jennifer, 1(4)264--289
-
Seberry, Jennifer, see Huang, Jianyong
-
secret, 2(4)360--365
-
secure, 1(1)22--31, 1(3)200--224, 1(3)225--235, 1(4)251--263,
1(4)290--308, 1(4)323--324, 2(1)68--81, 2(2)159--197, 2(3)271--287,
3(1)21--46, 3(2)166--180, 3(3)262--287
-
secure, CCA-, 3(3)288--311
-
Securing, 1(2)91--107
-
security, 1(1)70--77, 1(2)108--119, 1(2)144--159, 2(1)3--12, 3(1)84--96,
3(3)262--287, 3(4)377--393
-
security, CCA-, 3(3)288--311
-
semi-trusted, 2(2)139--153
-
Sengupta, Abhrajit, 3(3)225--235
-
Sengupta, Abhrajit, see Ghosh, Shamit
-
separation, 3(4)377--393
-
Session-StateReveal, 2(2)83--99
-
set, 2(4)289--303
-
set-up, 2(1)13--22
-
Shahandashti, Siamak F., 2(3)250--270
-
Shahandashti, Siamak F., see Hinek, M. Jason
-
Shannon, 1(3)161--168
-
Shikata, Junji, 3(3)288--311
-
Shikata, Junji, see Ishida, Yuu
-
shorter, 3(3)210--224
-
shortest, 3(4)313--329
-
side, 2(2)121--138
-
sieve, 3(4)313--329
-
Sieving, 3(4)313--329
-
sign, 3(4)394--406
-
signature, 1(2)120--132, 1(2)133--143, 1(4)320--322, 2(1)35--45,
2(3)229--249, 3(1)84--96, 3(2)148--165, 3(4)394--406
-
signcryption, 2(3)199--211
-
similarity, 3(1)21--46
-
single, 3(4)394--406
-
SIP, 2(1)13--22
-
sloppy, 2(3)212--228
-
sloth, 3(4)330--343
-
slow-timed, 3(4)330--343
-
SMS4, 2(1)60--67, 3(1)1--20
-
SMS4, p-, 3(1)1--20
-
SNARK, zk-, 3(4)344--362
-
SNARKs, 3(4)344--362
-
Soled, Dana, Dachman-, 2(4)289--303
-
Solving, 2(3)212--228
-
Soshi, Masakazu, 2(1)46--59
-
Soshi, Masakazu, see Emura, Keita
-
Sow, Djiby, 2(4)360--365
-
Sow, Djiby, see Ciss, Abdoul Aziz
-
specifications, 1(2)144--159
-
specified, post-, 1(3)236--250
-
Sponge, 3(3)262--287
-
Sponge-based, 3(3)262--287
-
Srinathan, Kannan, 1(3)200--224, 2(2)159--197
-
Srinathan, Kannan, see Patra, Arpita
-
SSO, 3(4)394--406
-
standard, 1(3)181--199, 3(2)148--165, 3(2)181--194, 3(3)210--224
-
StateReveal, Session-, 2(2)83--99
-
Stevens, Marc, 2(4)322--359
-
Stevens:2012:CPC, 2(4)322--359
-
Stinson, Douglas R., 1(3)169--180, 2(2)100--120
-
Stinson, Douglas R., see Goldberg, Ian,
see Sui, Jiayuan
-
storage, 3(3)196--209
-
Strand, Lars, 2(1)13--22
-
Strand, Lars, see Hagalisletto, Anders Moen
-
string, 3(4)344--362
-
strong, 1(2)91--107
-
stronger, 2(2)83--99
-
Strongly, 2(1)35--45
-
Stüble, Christian, 1(4)251--263, see Wolf, Marko
-
study, 3(3)225--235
-
Su, Bozhan, 2(1)60--67
-
Su, Bozhan, see Zhang, Wentao
-
Subset-Sum, 3(4)344--362
-
subtree, 3(3)288--311
-
Sui, Jiayuan, 1(3)169--180
-
Sui:2009:CAI, 1(3)169--180
-
Sum, Subset-, 3(4)344--362
-
superdistribution, 1(4)251--263
-
supply, 2(1)3--12
-
supporting, 1(2)79--90, 2(4)304--321
-
Susilo, Willy, 1(2)120--132, 1(4)264--289
-
Susilo, Willy, see Huang, Jianyong,
see Plantard, Thomas
-
synchronous, 2(2)159--197
-
system, 1(3)169--180, 3(4)394--406