Secure multi-party computation

Results: 221



#Item
51The Bitcoin Backbone Protocol: Analysis and Applications∗ Aggelos Kiayias† University of Athens

The Bitcoin Backbone Protocol: Analysis and Applications∗ Aggelos Kiayias† University of Athens

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-27 08:23:49
52Secure Protocols for Secrecy Hanane Houmani and Mohamed Mejri LSFM Research Group Computer Science Department LAVAL University Quebec, Canada

Secure Protocols for Secrecy Hanane Houmani and Mohamed Mejri LSFM Research Group Computer Science Department LAVAL University Quebec, Canada

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
53An Equational Approach to Secure Multi-party Computation∗ Daniele Micciancio† Stefano Tessaro‡  January 12, 2013

An Equational Approach to Secure Multi-party Computation∗ Daniele Micciancio† Stefano Tessaro‡ January 12, 2013

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2016-01-05 19:34:25
    54Covert Two-Party Computation Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PANicholas Hopper

    Covert Two-Party Computation Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PANicholas Hopper

    Add to Reading List

    Source URL: hunch.net

    Language: English - Date: 2005-03-01 11:04:04
    55Crypto connections … and dividing a pie Rump Session of the Workshop on T&P of SMPC (May 08, 2014 – Aarhus, Denmark)

    Crypto connections … and dividing a pie Rump Session of the Workshop on T&P of SMPC (May 08, 2014 – Aarhus, Denmark)

    Add to Reading List

    Source URL: cfem.au.dk

    Language: English - Date: 2015-08-24 07:02:25
    56How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation (Short Paper) Dan Bogdanov1 , Marko Jõemets1 , Sander Siim1,2 , and Meril Vaht1 1

    How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation (Short Paper) Dan Bogdanov1 , Marko Jõemets1 , Sander Siim1,2 , and Meril Vaht1 1

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:33:35
    57A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jenifer Rexford††, Scott Shenker

    A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jenifer Rexford††, Scott Shenker

    Add to Reading List

    Source URL: www.cs.yale.edu

    Language: English - Date: 2012-10-05 20:46:17
    58Privacy-Preserving Observation in Public Spaces Florian Kerschbaum1 and Hoon Wei Lim2 1 SAP Karlsruhe, Germany

    Privacy-Preserving Observation in Public Spaces Florian Kerschbaum1 and Hoon Wei Lim2 1 SAP Karlsruhe, Germany

    Add to Reading List

    Source URL: www.fkerschbaum.org

    Language: English - Date: 2015-06-23 05:52:39
    59Smart Meter Aggregation via Secret-Sharing George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin Microsoft Research, Cambridge, UK {gdane,fournet,markulf,santiago}@microsoft.com

    Smart Meter Aggregation via Secret-Sharing George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin Microsoft Research, Cambridge, UK {gdane,fournet,markulf,santiago}@microsoft.com

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-11-04 03:36:30
    60Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

    Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

    Add to Reading List

    Source URL: www.cs.bris.ac.uk

    Language: English - Date: 2012-09-07 07:03:05