Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5484
search results - page 16 / 1097
»
Almost-Everywhere Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
126
click to vote
TCC
2009
Springer
131
views
Cryptology
»
more
TCC 2009
»
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
16 years 3 months ago
Download
eprint.iacr.org
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
claim paper
Read More »
94
click to vote
ICALP
2000
Springer
139
views
Programming Languages
»
more
ICALP 2000
»
One-Round Secure Computation and Secure Autonomous Mobile Agents
15 years 7 months ago
Download
www.zurich.ibm.com
d Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M
Christian Cachin, Jan Camenisch, Joe Kilian, Joy M...
claim paper
Read More »
72
Voted
STOC
2004
ACM
94
views
Algorithms
»
more
STOC 2004
»
Completeness in two-party secure computation: a computational view
16 years 3 months ago
Download
www.wisdom.weizmann.ac.il
Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen
claim paper
Read More »
95
click to vote
GI
2005
Springer
100
views
Theoretical Computer Science
»
more
GI 2005
»
Building More Secure Commercial Software: The Trustworthy Computing Security Development Lifecycle
15 years 9 months ago
Download
subs.emis.de
Steven B. Lipner
claim paper
Read More »
102
click to vote
CSREASAM
2008
82
views
Security Privacy
»
more
CSREASAM 2008
»
Securing Security Policies in Autonomic Computing Systems
15 years 4 months ago
Download
www.cs.gmu.edu
Ghassan Jabbour, Daniel A. Menascé
claim paper
Read More »
« Prev
« First
page 16 / 1097
Last »
Next »