Sciweavers

2967 search results - page 72 / 594
» Cryptology
Sort
View
CRYPTO
2010
Springer
109views Cryptology» more  CRYPTO 2010»
15 years 6 months ago
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
Rosario Gennaro, Craig Gentry, Bryan Parno
CRYPTO
2010
Springer
109views Cryptology» more  CRYPTO 2010»
15 years 6 months ago
Equivalence of Uniform Key Agreement and Composition Insecurity
Chongwon Cho, Chen-Kuei Lee, Rafail Ostrovsky
CRYPTO
2010
Springer
140views Cryptology» more  CRYPTO 2010»
15 years 6 months ago
Password-Authenticated Session-Key Generation on the Internet in the Plain Model
Vipul Goyal, Abhishek Jain 0002, Rafail Ostrovsky
FC
2010
Springer
166views Cryptology» more  FC 2010»
15 years 6 months ago
Ethical Proactive Threat Research
John Aycock, John Sullins
CTRSA
2008
Springer
97views Cryptology» more  CTRSA 2008»
15 years 6 months ago
Public-Key Encryption with Non-interactive Opening
Ivan Damgård, Dennis Hofheinz, Eike Kiltz, R...