×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [real adversary]
Documents
Security Analysis of Network Protocols: Logical and Computational Methods John Mitchell Stanford University Logic and Computational Complexity, 2006
221 views
Documents
1 Introduction to Secure Computation Benny Pinkas HP Labs, Princeton
224 views
Documents
Survey: Secure Composition of Multiparty Protocols Yehuda Lindell IBM T.J. Watson
216 views
Documents
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
215 views
Documents
The Ruins of a Myth or a Myth in Ruins? Paul Blokker University of Trento
40 views
Documents
Secure Multiparty Computation
83 views