Threshold cryptosystem
Results: 25
# | Item |
---|---|
21![]() | Private Keyword-Based Push and Pull with Applications to Anonymous Communication (Extended Abstract) Lea Kissner1 , Alina Oprea1 , Michael K. Reiter12 , Dawn Song12 , and Ke Yang1 1Add to Reading ListSource URL: www.cs.cmu.eduLanguage: English - Date: 2004-04-21 13:20:55 |
22![]() | Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO ReviewAdd to Reading ListSource URL: people.csail.mit.eduLanguage: English - Date: 2013-05-16 05:06:00 |
23![]() | Author manuscript, published in "Financial Cryptography, 4th International Conference[removed]104"Add to Reading ListSource URL: hal.inria.frLanguage: English - Date: 2011-02-11 09:14:00 |
24![]() | PDF DocumentAdd to Reading ListSource URL: www.ics.uci.eduLanguage: English - Date: 2004-02-15 17:51:33 |
25![]() | PDF DocumentAdd to Reading ListSource URL: www.cs.berkeley.eduLanguage: English - Date: 2006-05-19 13:27:55 |