Sciweavers

2967 search results - page 72 / 594
» Cryptology
Sort
View
CRYPTO
2010
Springer
109views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
Rosario Gennaro, Craig Gentry, Bryan Parno
CRYPTO
2010
Springer
109views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Equivalence of Uniform Key Agreement and Composition Insecurity
Chongwon Cho, Chen-Kuei Lee, Rafail Ostrovsky
CRYPTO
2010
Springer
140views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Password-Authenticated Session-Key Generation on the Internet in the Plain Model
Vipul Goyal, Abhishek Jain 0002, Rafail Ostrovsky
FC
2010
Springer
166views Cryptology» more  FC 2010»
14 years 10 months ago
Ethical Proactive Threat Research
John Aycock, John Sullins
CTRSA
2008
Springer
97views Cryptology» more  CTRSA 2008»
14 years 10 months ago
Public-Key Encryption with Non-interactive Opening
Ivan Damgård, Dennis Hofheinz, Eike Kiltz, R...