Secret sharing

Results: 195



#Item
31Scalable Rational Secret Sharing [Extended Abstract] Varsha Dani Mahnush Movahedi

Scalable Rational Secret Sharing [Extended Abstract] Varsha Dani Mahnush Movahedi

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
32Sherpa ToU + PPpages

Sherpa ToU + PPpages

Add to Reading List

Source URL: trysherpa.com

Language: English - Date: 2016-08-18 10:12:56
33Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2014-05-12 11:51:10
34Optimal information rate of secret sharing schemes on trees L´aszl´o Csirmaz∗ G´abor Tardos†

Optimal information rate of secret sharing schemes on trees L´aszl´o Csirmaz∗ G´abor Tardos†

Add to Reading List

Source URL: www.renyi.hu

Language: English - Date: 2012-10-25 08:38:58
    351  Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank Stajano

    1 Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank Stajano

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2012-06-23 18:45:47
    36To Have and Have Not: Variations on Secret Sharing to Model User Presence Quentin Stafford-Fraser University of Cambridge Computer Lab

    To Have and Have Not: Variations on Secret Sharing to Model User Presence Quentin Stafford-Fraser University of Cambridge Computer Lab

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2014-07-05 13:33:42
    37Lecture Notes on SECRET SHARING Exposition by Bill Gasarch 1  Introduction

    Lecture Notes on SECRET SHARING Exposition by Bill Gasarch 1 Introduction

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2016-01-13 14:24:25
      38Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1  2

      Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2016-05-17 22:04:37
      39journal of economic theory 83, 69article no. ET982444 Secure Protocols or How Communication Generates Correlation Olivier Gossner*

      journal of economic theory 83, 69article no. ET982444 Secure Protocols or How Communication Generates Correlation Olivier Gossner*

      Add to Reading List

      Source URL: ogossner.free.fr

      Language: English - Date: 2005-10-17 11:53:01
      40Microsoft PowerPoint - lec7-secret-sharing

      Microsoft PowerPoint - lec7-secret-sharing

      Add to Reading List

      Source URL: inst.eecs.berkeley.edu

      Language: English - Date: 2008-09-22 12:05:38