Sciweavers

101 search results - page 21 / 21
» Simple Password-Based Encrypted Key Exchange Protocols
Sort
View
94
Voted
ICALP
2009
Springer
16 years 1 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...