Secret sharing

Results: 195



#Item
161To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-09 19:28:02
162Secure Computation of the kth-Ranked Element Gagan Aggarwal? , Nina Mishra?? , and Benny Pinkas? ? ? Abstract. Given two or more parties possessing large, confidential datasets, we consider the problem of securely comput

Secure Computation of the kth-Ranked Element Gagan Aggarwal? , Nina Mishra?? , and Benny Pinkas? ? ? Abstract. Given two or more parties possessing large, confidential datasets, we consider the problem of securely comput

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-05-12 12:29:01
163562  IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18,

562 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18,

Add to Reading List

Source URL: johannvandermerwe.co.za

Language: English - Date: 2013-06-28 06:18:45
164Further Simplifications in Proactive RSA Signatures Stanislaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA {stasio, nitesh}@ics.uci.edu

Further Simplifications in Proactive RSA Signatures Stanislaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA {stasio, nitesh}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2005-03-04 00:10:28
165To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2014-05-09 19:28:02
166An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol Stanisław Jarecki, Nitesh Saxena, and Jeong Hyun Yi School of Information and Computer Science UC Irvine, CA 92697, USA

An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol Stanisław Jarecki, Nitesh Saxena, and Jeong Hyun Yi School of Information and Computer Science UC Irvine, CA 92697, USA

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:04:09
167TERMS OF CONFIDENTIALITY In the context of the risk sharing instrument for innovation and research oriented SMEs and small mid-caps (the “RSI”), certain financial intermediaries (“Financial intermediaries”) apply

TERMS OF CONFIDENTIALITY In the context of the risk sharing instrument for innovation and research oriented SMEs and small mid-caps (the “RSI”), certain financial intermediaries (“Financial intermediaries”) apply

Add to Reading List

Source URL: www.eif.europa.eu

Language: English - Date: 2013-03-05 06:10:58
168TERMS OF CONFIDENTIALITY In the context of the risk sharing instrument for innovation and research oriented SMEs and small mid-caps (the “RSI”), certain financial intermediaries (“Financial intermediaries”) apply

TERMS OF CONFIDENTIALITY In the context of the risk sharing instrument for innovation and research oriented SMEs and small mid-caps (the “RSI”), certain financial intermediaries (“Financial intermediaries”) apply

Add to Reading List

Source URL: www.eif.org

Language: English - Date: 2014-06-17 12:46:57
169Secure Real-time User Preference Collection for Broadcast Scheduling Xuhua Ding, Shuhong Wang,Baihua Zheng, School of Information Systems Singapore Management University Email: {xhding,shwang,bhzheng}@smu.edu.sg Abstract

Secure Real-time User Preference Collection for Broadcast Scheduling Xuhua Ding, Shuhong Wang,Baihua Zheng, School of Information Systems Singapore Management University Email: {xhding,shwang,bhzheng}@smu.edu.sg Abstract

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2006-06-20 04:15:38
170CSASC L. Csirmaz: Secret sharing on infinite structures  Secret Sharing on Infinite Structures

CSASC L. Csirmaz: Secret sharing on infinite structures Secret Sharing on Infinite Structures

Add to Reading List

Source URL: www.renyi.hu

Language: English - Date: 2010-01-24 18:07:30