-
1
-
-
33748686155
-
Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
-
ACM
-
I. Abraham, D. Dolev, R. Gonen, and J. Halpern. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing, pages 53-62. ACM, 2006.
-
(2006)
Proceedings of the Twenty-fifth Annual ACM Symposium on Principles of Distributed Computing
, pp. 53-62
-
-
Abraham, I.1
Dolev, D.2
Gonen, R.3
Halpern, J.4
-
2
-
-
85018107502
-
Vanish: Increasing data privacy with self-destructing data
-
USENIX Association
-
R. Geambasu, T. Kohno, A. Levy, and H. Levy. Vanish: Increasing data privacy with self-destructing data. In Proceedings of the 18th conference on USENIX security symposium, pages 299-316. USENIX Association, 2009.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium
, pp. 299-316
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.3
Levy, H.4
-
6
-
-
33748582624
-
Rational secure computation and ideal mechanism design
-
IEEE
-
S. Izmalkov, S. Micali, and M. Lepinski. Rational secure computation and ideal mechanism design. In Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on, pages 585-594. IEEE, 2005.
-
(2005)
Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on
, pp. 585-594
-
-
Izmalkov, S.1
Micali, S.2
Lepinski, M.3
-
9
-
-
33748680791
-
Collusion-free protocols
-
Citeseer
-
M. Lepinksi, S. Micali, and A. Shelat. Collusion-free protocols. In ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, volume 37, page 543. Citeseer, 2005.
-
(2005)
Annual ACM Symposium On Theory Of Computing
, vol.37
, pp. 543
-
-
Lepinksi, M.1
Micali, S.2
Shelat, A.3
-
10
-
-
10444265884
-
Completely fair SFE and coalition-safe cheap talk
-
ACM
-
M. Lepinski, S. Micali, C. Peikert, and A. Shelat. Completely fair SFE and coalition-safe cheap talk. In Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing, pages 1-10. ACM, 2004.
-
(2004)
Proceedings of the Twenty-third Annual ACM Symposium on Principles of Distributed Computing
, pp. 1-10
-
-
Lepinski, M.1
Micali, S.2
Peikert, C.3
Shelat, A.4
-
13
-
-
0019572642
-
NEW HASH FUNCTIONS and THEIR USE in AUTHENTICATION and SET EQUALITY
-
DOI 10.1016/0022-0000(81)90033-7
-
M. Wegman and J. Carter. New hash functions and their use in authentication and set equality. Journal of computer and system sciences, 22(3):265-279, 1981. (Pubitemid 12444638)
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|