Sciweavers

5484 search results - page 7 / 1097
» Almost-Everywhere Secure Computation
Sort
View
123
Voted
EUROCRYPT
2011
Springer
14 years 5 months ago
Towards a Game Theoretic View of Secure Computation
Gilad Asharov, Ran Canetti, Carmit Hazay
ATAL
2011
Springer
14 years 1 months ago
Improved computational models of human behavior in security games
Rong Yang, Christopher Kiekintveld, Fernando Ord&o...
67
Voted
IACR
2011
89views more  IACR 2011»
14 years 1 months ago
Concurrently Secure Computation in Constant Rounds
Sanjam Garg, Vipul Goyal, Abhishek Jain 0002, Amit...
63
Voted
IACR
2011
89views more  IACR 2011»
14 years 1 months ago
Threshold Fully Homomorphic Encryption and Secure Computation
Steven Myers, Mona Sergi, Abhi Shelat
93
Voted
CRYPTO
2012
Springer
217views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
Must You Know the Code of f to Securely Compute f?
Mike Rosulek