Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5484
search results - page 68 / 1097
»
Almost-Everywhere Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
114
Voted
EUROCRYPT
2007
Springer
121
views
Cryptology
»
more
EUROCRYPT 2007
»
Efficient Two-Party Secure Computation on Committed Inputs
15 years 7 months ago
Download
userweb.cs.utexas.edu
Stanislaw Jarecki, Vitaly Shmatikov
claim paper
Read More »
105
Voted
ASIACRYPT
2000
Springer
71
views
Cryptology
»
more
ASIACRYPT 2000
»
Efficient Secure Multi-party Computation
15 years 7 months ago
Download
ftp.inf.ethz.ch
Martin Hirt, Ueli M. Maurer, Bartosz Przydatek
claim paper
Read More »
105
Voted
IFIP
1992
Springer
114
views
Programming Languages
»
more
IFIP 1992
»
Human Factors In Computer Security
15 years 7 months ago
Download
www-inst.eecs.berkeley.edu
Ibibia Dabipi, Husam Yaghi, Issam Qasem
claim paper
Read More »
98
click to vote
ICSOFT
2008
100
views
Software Engineering
»
more
ICSOFT 2008
»
Improving the Security of Mobile-Phone Access to Remote Personal Computers
15 years 5 months ago
Download
cs.gmu.edu
Alireza P. Sabzevar, João Pedro Sousa
claim paper
Read More »
105
Voted
DGO
2004
114
views
Education
»
more
DGO 2004
»
Regression on Distributed Databases via Secure Multi-Party Computation
15 years 5 months ago
Download
dgrc.org
Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, Jerom...
claim paper
Read More »
« Prev
« First
page 68 / 1097
Last »
Next »