-
1
-
-
0034828870
-
Cryptographic security for mobile code
-
Joy Algesheimer, Christian Cachin, Jan Camenisch and Günter Karjoth, "Cryptographic Security for Mobile Code", Proceedings of IEEE Security and Privacy 2001, pp. 2-11, 2001.
-
(2001)
Proceedings of IEEE Security and Privacy 2001
, pp. 2-11
-
-
Algesheimer, J.1
Cachin, C.2
Camenisch, J.3
Karjoth, G.4
-
3
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Springer Verlag
-
Boz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudlich, Amit Sahai, Salil Vadhan and Ke Yang, "On the (Im)possibility of Obfuscating Programs", Advances in Cryptology - Crypto 2001, Lecture Notes in Computer Science, Vol. 2139, pp. 1-18, Springer Verlag, 2001.
-
(2001)
Advances in Cryptology - Crypto 2001, Lecture Notes in Computer Science
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudlich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
4
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
Michael Ben-Or, Shafi Goldwasser and Avi Wigderson, "Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation", 20th Symposium on Theory of Computing (STOC), ACM, pp. 1-10, 1988.
-
(1988)
20th Symposium on Theory of Computing (STOC), ACM
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
85008184918
-
Asynchronous secure computations with optimal resilience
-
Michael Ben-Or, Boaz Kelmer and Tall Rabin, "Asynchronous Secure Computations with Optimal Resilience", 13th PODC, pp. 183-192, 1994.
-
(1994)
13th PODC
, pp. 183-192
-
-
Ben-Or, M.1
Kelmer, B.2
Rabin, T.3
-
6
-
-
28144462281
-
Universally composable security: A new paradigm for cryptographic protocols
-
Report 2000/067
-
Ran Canetti, "Universally Composable Security: A New Paradigm for Cryptographic Protocols", Cryptology ePrint Archive, Report 2000/067.
-
Cryptology ePrint Archive
-
-
Canetti, R.1
-
7
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM
-
David Chuam, Claude Crépeau and Ivan Damgard, "Multiparty Unconditionally Secure Protocols", Proceedings of the 20th Annual Symp. on the Theory of Computing, pp. 11-19, ACM, 1988.
-
(1988)
Proceedings of the 20th Annual Symp. on the Theory of Computing
, pp. 11-19
-
-
Chuam, D.1
Crépeau, C.2
Damgard, I.3
-
9
-
-
84880854377
-
Robustness for free in unconditional multi-party computation
-
Springer-Verlag
-
Martin Hirt and Ueli Maurer, "Robustness for Free in Unconditional Multi-Party Computation", Crypto 2001, Lecture Notes in Computer Science, Vol. 2139, pp. 101-118, Springer-Verlag, 2001.
-
(2001)
Crypto 2001, Lecture Notes in Computer Science
, vol.2139
, pp. 101-118
-
-
Hirt, M.1
Maurer, U.2
-
10
-
-
1642306991
-
An approach to solve the problem of malicious hosts
-
Fritz Hohl, "An Approach to Solve the Problem of Malicious Hosts", Fakultätsbericht, Universität Stuttgart, Fakultät für Informatik, Germany, Vol. 1997/03, 1997.
-
(1997)
Fakultätsbericht, Universität Stuttgart, Fakultät für Informatik, Germany
, vol.2003
-
-
Hohl, F.1
-
13
-
-
84982937984
-
Mutual protection of co-operating agents
-
In Jan Vitek, and Christian Jensen, editors; Springer Verlag
-
Volker Roth, "Mutual protection of co-operating agents", In Jan Vitek, and Christian Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Lecture Notes in Computer Science, Vol. 1603, pp. 275-285, Springer Verlag, 1999.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Lecture Notes in Computer Science
, vol.1603
, pp. 275-285
-
-
Voker, R.1
|