{"title":"Credential Vaulting","authors":"Padmaraj M. V. Nair","doi":"10.1007/978-3-642-27739-9_1495-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1495-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124024119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Johan Gehrke, Daniel Kifer, Ashwin Machanavajjhala
{"title":"ℓ-Diversity","authors":"Johan Gehrke, Daniel Kifer, Ashwin Machanavajjhala","doi":"10.1007/978-3-642-27739-9_899-2","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_899-2","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128937523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single-Server Private Information Retrieval","authors":"Chang Dong","doi":"10.1007/978-3-642-27739-9_1480-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1480-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117044078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Insurance and Security Investment Strategy","authors":"A. Yannacopoulos, S. Katsikas","doi":"10.1007/978-3-642-27739-9_1618-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1618-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117342544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attack Graphs","authors":"M. Zaber","doi":"10.1007/978-3-642-27739-9_1497-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1497-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115748818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mix-Zones in Wireless Mobile Networks","authors":"Panos Papadimitratos","doi":"10.1007/978-3-642-27739-9_1534-2","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1534-2","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116276418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Searchable Symmetric Encryption","authors":"Juan A. Garay","doi":"10.1007/978-3-642-27739-9_1473-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1473-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125658914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA Security","authors":"R. Chakraborty, R. Mukherjee","doi":"10.1007/978-3-642-27739-9_1644-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1644-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Fatigue","authors":"S. Furnell","doi":"10.1007/978-3-642-27739-9_1591-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1591-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126080528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}