Search Result
Save to File
Your search for
42144
returns
1393
document(s)
Multi-party computation from any linear scret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, hal. 1-15
Author: Ventzislav Nikov; Svotla Nikova; Bark Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Multy-party Computation from any linear secret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-15
Author: Ventzislav Nikov; Svetla Nikova; Bart Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Secure multi-party computation made simple, (LNCS-Lecture Notes in Computer Science 2576) Hal 14-28
Author: Ueli Maurer; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Secure multi-party computation using virtual parties for computation on encrypted data, (LNCS-Lecture Notes in Computer Science 5576) Hal. 412-421
Author: Rohit Pathak; Satyadhar Joshi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Parallel Computation: Polylog-Time and Near-Linear Work Approximations Scheme for Undirected Shortest Paths
Author: E. Cohen | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
How to convert any digital signature scheme into a group signature scheme, (LNCS-Lecture Notes in Computer Science 1361) Hal 177-190
Author: Holger Petersen; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
On a class of key agreement protocols which cannot be unconditionally secure, (LNCS-Lecture Notes in Computer Science 2576) Hal 133-145
Author: Frank Niedermeyer; Werner Schindler; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Congestion control in secure multiparty computation, HAL.902-909
Author: Zulfa Shaikh and Manta Sakpal; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A minimal model for secure computation(extended abstract),Hal 554-563
Author: Uri Feige; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
The Conceptualization for a Configurable Multi-party Multi-message Request-Reply Conversation (735-753)
Author: Nataliya Mulyar Lachlan Aldred Wil M.P van der Aalst; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next