Sciweavers

31 search results - page 7 / 7
» Possibilities and Limitations of Modeling Trust and Reputati...
Sort
View
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
14 years 10 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...