×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [real protocol]
Documents
ftp
822 views
Documents
A Two-Server Auction Scheme Ari Juels and Mike Szydlo Financial Cryptography 02 12 March 2002
218 views
Business
Persistent Security for RFID
209 views
Documents
MATTHEW FRANKLIN PAYMAN MOHASSEL UC DAVIS U OF CALGARY Secure Evaluation of Multivariate Polynomials 1
218 views
Documents
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
215 views
Documents
0x1A Great Papers in Computer Security
30 views
Documents
A Sybil-proof DHT using a social network
29 views
Documents
Impossibility Results for Concurrent Two-Party Computation
28 views
Documents
Slide 1 Vitaly Shmatikov CS 380S Introduction to Secure Multi-Party Computation
219 views
Documents
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized
232 views
Documents
Oblivious Transfer based on the McEliece Assumptions
34 views
Documents
Oblivious Transfer based on the McEliece Assumptions Rafael Dowsley Jeroen van der Graaf Jörn Müller-Quade Anderson C. A. Nascimento University of Brasilia
219 views
Next >