Sciweavers

5476 search results - page 19 / 1096
» Resettably Secure Computation
Sort
View
ESORICS
2007
Springer
15 years 8 months ago
Inductive Proofs of Computational Secrecy
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
63
Voted
CCS
2003
ACM
15 years 7 months ago
Automatic generation of two-party computations
Philip D. MacKenzie, Alina Oprea, Michael K. Reite...
107
Voted
ITIIS
2010
128views more  ITIIS 2010»
15 years 10 days ago
Semi-trusted Collaborative Framework for Multi-party Computation
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
Kok Seng Wong, Myung Ho Kim
SIGCSE
2004
ACM
95views Education» more  SIGCSE 2004»
15 years 7 months ago
Cryptography and computer security for undergraduates
The panel discusses solutions to the problem of computer security education. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: security and protection. E...
Paul De Palma, Charles Frank, Suzanne E. Gladfelte...