Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5484
search results - page 7 / 1097
»
Almost-Everywhere Secure Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
35
click to vote
EUROCRYPT
2011
Springer
187
views
Cryptology
»
more
EUROCRYPT 2011
»
Towards a Game Theoretic View of Secure Computation
13 years 1 months ago
Download
eprint.iacr.org
Gilad Asharov, Ran Canetti, Carmit Hazay
claim paper
Read More »
23
click to vote
ATAL
2011
Springer
187
views
Intelligent Agents
»
more
ATAL 2011
»
Improved computational models of human behavior in security games
12 years 9 months ago
Download
teamcore.usc.edu
Rong Yang, Christopher Kiekintveld, Fernando Ord&o...
claim paper
Read More »
20
click to vote
IACR
2011
89
views
more
IACR 2011
»
Concurrently Secure Computation in Constant Rounds
12 years 9 months ago
Download
www.cs.ucla.edu
Sanjam Garg, Vipul Goyal, Abhishek Jain 0002, Amit...
claim paper
Read More »
19
click to vote
IACR
2011
89
views
more
IACR 2011
»
Threshold Fully Homomorphic Encryption and Secure Computation
12 years 9 months ago
Download
eprint.iacr.org
Steven Myers, Mona Sergi, Abhi Shelat
claim paper
Read More »
25
click to vote
CRYPTO
2012
Springer
217
views
Cryptology
»
more
CRYPTO 2012
»
Must You Know the Code of f to Securely Compute f?
12 years 7 days ago
Download
eprint.iacr.org
Mike Rosulek
claim paper
Read More »
« Prev
« First
page 7 / 1097
Last »
Next »