Computation

Results: 6765



#Item
271

David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran∗ Gil Segev∗

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2008-01-31 10:30:41
    272

    Multiparty Computation, an Introduction Ronald Cramer Ivan Damgård Jesper Buus Nielsen

    Add to Reading List

    Source URL: www.daimi.au.dk

    - Date: 2009-05-20 09:10:29
      273

      Poster: Secure Gale-Shapley Efficient Stable Matching for Multi-Party Computation Jack Doerner University of Virginia

      Add to Reading List

      Source URL: www.ieee-security.org

      - Date: 2016-05-18 07:17:44
        274

        Appears in the Proceedings of the 41st International Symposium on Computer Architecture, 2014 General-Purpose Code Acceleration with Limited-Precision Analog Computation Renée St. Amant? Hadi Esmaeilzadeh§

        Add to Reading List

        Source URL: homes.cs.washington.edu

        - Date: 2014-05-05 23:45:39
          275

          Draft version of book chapter published in: Hourcade, J.P. and Nathan, L. (2013). Human Computation and Conflict. In Michelucci (Ed.) Handbook of Human Computation (pp. 993­1009). New York: Spr

          Add to Reading List

          Source URL: homepage.cs.uiowa.edu

          - Date: 2013-12-11 10:22:59
            276

            A ray casting method for the computation of the area of feasible solutions for multicomponent systems: Theory, applications and FACPACK-implementation. Mathias Sawalla , Klaus Neymeyra,b a Universit¨ at

            Add to Reading List

            Source URL: alf.math.uni-rostock.de

            - Date: 2016-12-06 11:03:08
              277

              Poster: Secure Multi-Party Computation as a Tool for Privacy-Preserving Data Analysis Samuel Havron University of Virginia

              Add to Reading List

              Source URL: www.ieee-security.org

              - Date: 2016-05-18 07:17:44
                278

                An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2008-01-30 02:51:31
                  279

                  Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2014-10-29 04:46:48
                    280

                    Object : Job offer : Analysis of multi-criteria path computation on very-large graphs This position could be fulfilled by either:

                    Add to Reading List

                    Source URL: www-sop.inria.fr

                    - Date: 2013-12-16 04:01:46
                      UPDATE