Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by S. Edoho-Eket
Configurable Security Protocols for Multi-Party Data Analysis With Malicious Participants
Related publications
The Conceptualization of a Configurable Multi-Party Multi-Message Request-Reply Conversation
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Efficient Protocols for Set Intersection and Pattern Matching With Security Against Malicious and Covert Adversaries
Constructing Optimistic Multi-Party Contract Signing Protocols
Privacy-Preserving Data Mining on Data Grids in the Presence of Malicious Participants
Framework for Analysis of Multi-Party Collaboration
Reverse Engineering for Malicious Code Behavior Analysis Using Virtual Security Patching
International Journal of Computer Applications
Dynamically Configurable Security for SRAM FPGA Bitstreams
International Journal of Embedded Systems
Hardware
Architecture
Software
Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications
A Decidable Analysis of Security Protocols