Sciweavers

101 search results - page 21 / 21
» Simple Password-Based Encrypted Key Exchange Protocols
Sort
View
ICALP
2009
Springer
14 years 5 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...