EMBED <iframe src="https://archive.org/embed/sid-meiers-civilization-ii-64-bit-compatible" width="560" height="384" frameborder="0" webkitallowfullscreen="true ...
Abstract: We introduce a new setting for two-party cryptography by introducing the notion of temporarily trusted third parties. These third parties act honest-but-curious during the execution of the ...
Abstract: As the devices in Wireless Sensor Networks (WSNs) are small in size, and have resource constraints such as memory utilization, power consumption, and processing speed that needs to be taken ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results