Provable

Results: 110



#Item
31

Adapting Helios for provable ballot privacy David Bernhard1 , V´eronique Cortier2 , Olivier Pereira3 , Ben Smyth2 , Bogdan Warinschi1 1 3

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 07:06:16
    32Anonymity / Privacy / Theoretical computer science / Auxy / Cryptography / De-anonymization / Differential privacy / Recommender system / Algorithm / Academia

    Provable De-anonymization of Large Datasets with Sparse Dimensions Anupam Datta, Divya Sharma, and Arunesh Sinha Carnegie Mellon University {danupam,divyasharma,aruneshs}@cmu.edu

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-02-12 12:31:56
    33

    Adapting Helios for provable ballot privacy David Bernhard1 , V´eronique Cortier2 , Olivier Pereira3 , Ben Smyth2 , Bogdan Warinschi1 1 3

    Add to Reading List

    Source URL: www.uclouvain.be

    Language: English - Date: 2011-12-14 05:30:34
      34

      0 Efficient Dynamic Provable Possession of Remote Data via Update Trees YIHUA ZHANG and MARINA BLANTON, University of Notre Dame The emergence and wide availability of remote storage service providers prompted work in t

      Add to Reading List

      Source URL: www.cse.nd.edu

      Language: English - Date: 2015-04-23 13:40:00
        35

        Efficient Dynamic Provable Possession of Remote Data via Balanced Update Trees Yihua Zhang and Marina Blanton Department of Computer Science and Engineering University of Notre Dame

        Add to Reading List

        Source URL: www.cse.nd.edu

        Language: English - Date: 2013-04-03 19:43:53
          36

          Dynamic Provable Data Possession C. Chris Erway Alptekin K¨upc¸u¨ Charalampos Papamanthou

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2009-11-29 23:55:56
            37

            A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage∗ Sooyeon Shin and Taekyoung Kwon† Graduate School of Information, Yonsei University, Seoul, Republic of Korea shinsy80@gmai

            Add to Reading List

            Source URL: isyou.info

            Language: English - Date: 2015-08-26 21:22:36
              38Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

              - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

              Add to Reading List

              Source URL: security-lab.jaist.ac.jp

              Language: English - Date: 2015-11-09 21:16:55
              39

              Adapting Helios for provable ballot privacy David Bernhard1 , V´eronique Cortier2 , Olivier Pereira3 , Ben Smyth2 , Bogdan Warinschi1 1 3

              Add to Reading List

              Source URL: www.bensmyth.com

              Language: English - Date: 2012-08-05 15:41:25
                40

                Adapting Helios for provable ballot privacy David Bernhard1 , V´eronique Cortier2 , Olivier Pereira3 , Ben Smyth2 , Bogdan Warinschi1 1 3

                Add to Reading List

                Source URL: www.lsv.ens-cachan.fr

                Language: English - Date: 2012-12-05 06:09:36
                  UPDATE