-
1
-
-
0025137207
-
The round complexity of secure protocols
-
ACM Press, New York
-
Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols. In: STOC 1990, pp. 503-513. ACM Press, New York (1990)
-
(1990)
STOC 1990
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
2
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
Brassard, G. (ed.), Springer, Heidelberg, CRYPTO 1989
-
Bellare, M., Micali, S.: Non-interactive oblivious transfer and applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.435, pp. 547-557. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
3
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
ACM Press, New York
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computations. In: STOC 1988, pp. 1-10. ACM Press, New York (1988)
-
(1988)
STOC 1988
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
85001025766
-
Wallet databases with observers
-
Brickell, E.F. (ed.), Springer, Heidelberg, CRYPTO 1992
-
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.740, pp. 89-105. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
5
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Information Systems Research 16(2), 186-208 (2005)
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
6
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
ACM (ed.), ACM Press, New York
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - A completeness theorem for protocols with honest majority. In: ACM (ed.) STOC 1987, pp. 218-229. ACM Press, New York (1987)
-
(1987)
STOC 1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
7
-
-
0344899914
-
Sharing information on computer systems security: An economic analysis
-
Gordon, L., Loeb, M., Lucyshyn, W.: Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy 22(6), 461-485 (2003)
-
(2003)
Journal of Accounting and Public Policy
, vol.22
, Issue.6
, pp. 461-485
-
-
Gordon, L.1
Loeb, M.2
Lucyshyn, W.3
-
8
-
-
77955339963
-
When worlds collide: Information sharing for the security and anti-virus communities
-
Gordon, S., Ford, R.: When worlds collide: information sharing for the security and anti-virus communities, IBM research paper (1999)
-
(1999)
IBM Research Paper
-
-
Gordon, S.1
Ford, R.2
-
10
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: USENIX Security Symposium, pp. 287-302 (2004)
-
(2004)
USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
13
-
-
64049119146
-
Efficient oblivious transfer protocols
-
Society for Industrial and Applied Mathematics, Philadelphia
-
Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: SODA 2001, pp. 448-457. Society for Industrial and Applied Mathematics, Philadelphia (2001)
-
(2001)
SODA 2001
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
-
14
-
-
0003508562
-
-
FIPS 186-192 January
-
NIST. Digital signature standard (DSS). FIPS 186-192 (January 2000), http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
-
(2000)
Digital Signature Standard (DSS)
-
-
-
15
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE Computer Society, Los Alamitos
-
Yao, A.C.-C.: How to generate and exchange secrets. In: FOCS 1986, pp. 162-167. IEEE Computer Society, Los Alamitos (1986)
-
(1986)
FOCS 1986
, pp. 162-167
-
-
Yao, A.C.-C.1
|