Secret sharing

Results: 195



#Item
11Scalable Rational Secret Sharing Introduction Scalable Rational Secret Sharing Dani et al. University of New Mexico

Scalable Rational Secret Sharing Introduction Scalable Rational Secret Sharing Dani et al. University of New Mexico

Add to Reading List

Source URL: www.dcg.ethz.ch

- Date: 2014-09-26 08:28:56
    12SECRET ELEPHANTS FOREST EXPERIENCE WITH GARETH PATTERSON Price from: R5,495 | $395 | €365 Based on 2 guests sharing for 2 nights  THE SECRET ELEPHANTS FOREST EXPERIENCE

    SECRET ELEPHANTS FOREST EXPERIENCE WITH GARETH PATTERSON Price from: R5,495 | $395 | €365 Based on 2 guests sharing for 2 nights THE SECRET ELEPHANTS FOREST EXPERIENCE

    Add to Reading List

    Source URL: capturedinafrica.com

    - Date: 2015-12-03 07:49:15
      13Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

      Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

      Add to Reading List

      Source URL: work.debayangupta.com

      Language: English - Date: 2014-06-25 08:00:47
      14Enigma: Decentralized Computation Platform with Guaranteed Privacy Guy Zyskind  Oz Nathan

      Enigma: Decentralized Computation Platform with Guaranteed Privacy Guy Zyskind Oz Nathan

      Add to Reading List

      Source URL: web.media.mit.edu

      Language: English - Date: 2015-06-27 14:46:30
      15MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hir

      MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hir

      Add to Reading List

      Source URL: www.cs.rpi.edu

      Language: English - Date: 2011-02-19 14:29:40
      16ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

      ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

      Add to Reading List

      Source URL: www.crypto.ethz.ch

      Language: English - Date: 2015-04-27 04:43:17
      17Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1  City College, City University of New York

      Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2016-01-26 19:57:17
      18The proceedings version of this paper appears in ACM CCSThis is the full version of that paper.  Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

      The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2007-08-20 03:37:31
      19A1_11042_Cover page 1.indd

      A1_11042_Cover page 1.indd

      Add to Reading List

      Source URL: debut.cis.nctu.edu.tw

      Language: English - Date: 2015-09-05 23:29:49
      20page bidon...  MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

      page bidon... MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

      Add to Reading List

      Source URL: www.chaum.com

      Language: English - Date: 2015-05-26 20:05:16