Secret sharing

Results: 195



#Item
21EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2012-02-11 16:01:44
22ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-04-27 13:05:10
23MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
24Rational Secret Sharing, Revisited [Extended Abstract] ∗ S. Dov Gordon

Rational Secret Sharing, Revisited [Extended Abstract] ∗ S. Dov Gordon

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-12-16 17:13:11
25LNCSPractical Private Information Aggregation in Large Networks

LNCSPractical Private Information Aggregation in Large Networks

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:54:47
26LNCSUntraceable Electronic Cash

LNCSUntraceable Electronic Cash

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:06:10
27Practical PIR for Electronic Commerce∗ Ryan Henry Femi Olumofin  Ian Goldberg

Practical PIR for Electronic Commerce∗ Ryan Henry Femi Olumofin Ian Goldberg

Add to Reading List

Source URL: homes.soic.indiana.edu

Language: English - Date: 2016-05-12 20:00:31
28A Comprehensive Security Model for Networking Applications

A Comprehensive Security Model for Networking Applications

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2012-09-05 17:42:27
29Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-06-24 16:43:48
30Systematizing Secure Computation for Research and Decision Support Jason Perry, Debayan Gupta, Joan Feigenbaum and Rebecca N. Wright Rutgers University, Yale University

Systematizing Secure Computation for Research and Decision Support Jason Perry, Debayan Gupta, Joan Feigenbaum and Rebecca N. Wright Rutgers University, Yale University

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2014-09-07 12:36:30