Sciweavers

EUROCRYPT   2008 Int. Workshop/Conference on Theory and Application of
Wall of Fame | Most Viewed EUROCRYPT-2008 Paper
EUROCRYPT
2008
Springer
14 years 1 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source164
2Download preprint from source162
3Download preprint from source157
4Download preprint from source129
5Download preprint from source126
6Download preprint from source124
7Download preprint from source120
8Download preprint from source118
9Download preprint from source107
10Download preprint from source106
11Download preprint from source105
12Download preprint from source102
13Download preprint from source101
14Download preprint from source95
15Download preprint from source91
16Download preprint from source91
17Download preprint from source90
18Download preprint from source87
19Download preprint from source85
20Download preprint from source82
21Download preprint from source80
22Download preprint from source79
23Download preprint from source79
24Download preprint from source78
25Download preprint from source76
26Download preprint from source73
27Download preprint from source69
28Download preprint from source69
29Download preprint from source64