-
1
-
-
0036957866
-
Explicit unique-neighbor expanders
-
Alon, N., Capalbo, M.R.: Explicit unique-neighbor expanders. In: 43rd FOCS, pp. 73-79 (2002)
-
(2002)
43rd FOCS
, pp. 73-79
-
-
Alon, N.1
Capalbo, M.R.2
-
2
-
-
85180542603
-
Cryptographic methods for storing ballots on a voting machine
-
Bethencourt, J., Boneh, D., Waters, B.: Cryptographic methods for storing ballots on a voting machine. In: 14th NDSS, pp. 209-222 (2007)
-
(2007)
14th NDSS
, pp. 209-222
-
-
Bethencourt, J.1
Boneh, D.2
Waters, B.3
-
3
-
-
84855200789
-
Lower and upper bounds on obtaining history-independence
-
Buchbinder, N., Petrank, E.: Lower and upper bounds on obtaining history-independence. Information and Computation 204(2), 291-337 (2006)
-
(2006)
Information and Computation
, vol.204
, Issue.2
, pp. 291-337
-
-
Buchbinder, N.1
Petrank, E.2
-
4
-
-
17444401270
-
Characterizing history independent data structures
-
Hartline, J.D., Hong, E.S., Mohr, A.E., Pentney, W.R., Rocke, E.: Characterizing history independent data structures. Algorithmica 42(1), 57-74 (2005)
-
(2005)
Algorithmica
, vol.42
, Issue.1
, pp. 57-74
-
-
Hartline, J.D.1
Hong, E.S.2
Mohr, A.E.3
Pentney, W.R.4
Rocke, E.5
-
5
-
-
51249167639
-
On the time and space complexity of computation using write-once memory -or- Is pen really much worse than pencil?
-
Irani, S., Naor, M., Rubinfeld, R.: On the time and space complexity of computation using write-once memory -or- Is pen really much worse than pencil? Mathematical Systems Theory 25(2), 141-159 (1992)
-
(1992)
Mathematical Systems Theory
, vol.25
, Issue.2
, pp. 141-159
-
-
Irani, S.1
Naor, M.2
Rubinfeld, R.3
-
6
-
-
0022037993
-
An asymptotically fast nonadaptive algorithm for conflict resolution in multiple-access channels
-
Komlós, J., Greenberg, A.G.: An asymptotically fast nonadaptive algorithm for conflict resolution in multiple-access channels. IEEE Transactions on Information Theory 31(2), 302-306 (1985)
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.2
, pp. 302-306
-
-
Komlós, J.1
Greenberg, A.G.2
-
7
-
-
0030676111
-
Oblivious data structures: Applications to cryptography
-
Micciancio, D.: Oblivious data structures: Applications to cryptography. In: 29th STOC, pp. 456-464 (1997)
-
(1997)
29th STOC
, pp. 456-464
-
-
Micciancio, D.1
-
8
-
-
33751038992
-
-
Molnar, D., Kohno, T., Sastry, N., Wagner, D.: Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or- How to store ballots on a voting machine. In: IEEE S&P, pp. 365-370. IEEE Computer Society Press, Los Alamitos (2006)
-
Molnar, D., Kohno, T., Sastry, N., Wagner, D.: Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or- How to store ballots on a voting machine. In: IEEE S&P, pp. 365-370. IEEE Computer Society Press, Los Alamitos (2006)
-
-
-
-
9
-
-
0034837160
-
Anti-persistence: History independent data structures
-
Naor, M., Teague, V.: Anti-persistence: History independent data structures. In: 33rd STOC, pp. 492-501 (2001)
-
(2001)
33rd STOC
, pp. 492-501
-
-
Naor, M.1
Teague, V.2
-
10
-
-
0020190402
-
How to reuse a write-once memory
-
Rivest, R.L., Shamir, A.: How to reuse a write-once memory. Information and Control 55(1-3), 1-19 (1982)
-
(1982)
Information and Control
, vol.55
, Issue.1-3
, pp. 1-19
-
-
Rivest, R.L.1
Shamir, A.2
|