-
2
-
-
33746365751
-
Secure Multiparty Protocols and Zero Knowledge Proof Systems Tolerating a Faulty Minority
-
[B91]
-
[B91] Donald Beaver: Secure Multiparty Protocols and Zero Knowledge Proof Systems Tolerating a Faulty Minority,Journal of Cryptology 4/2 (1991) 75-122.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
4
-
-
0028592391
-
Electronic Marking and Identification Techniques to Discourage Document Copying;
-
Toronto, June 12-16, [BLM94]
-
[BLM94] J. Brassil, S. Low, N. Maxemchuk, L. O'Gorman: Electronic Marking and Identification Techniques to Discourage Document Copying; Proceedings IEEE INFOCOM 94, Toronto, June 12-16, 1994, 1278-1287.
-
(1994)
Proceedings IEEE INFOCOM 94
, pp. 1278-1287
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.3
O'Gorman, L.4
-
5
-
-
84957670625
-
-
Crypto'95, LNCS 963, Springer-Verlag, Berlin, [BMP86]
-
[BMP86] G. R. Blakley, C. Meadows, G. B. Purdy: Fingerprinting Long Forgiving Messages',Crypto'85, LNCS 218, Springer-Verlag, Berlin 1986, 180-189. 1. [BS95]
-
(1995)
Collusion-Secure Fingerprinting for Digital Data;
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
6
-
-
84947942283
-
-
Crypto'85, LNCS 218, Springer-Verlag, Berlin, 1. [BS95]
-
G. R. Blakley, C. Meadows, G. B. Purdy: Fingerprinting Long Forgiving Messages',Crypto'85, LNCS 218, Springer-Verlag, Berlin 1986, 180-189. 1. [BS95]
-
(1986)
Fingerprinting Long Forgiving Messages
, pp. 180-189
-
-
Blakley, G.R.1
Meadows, C.2
Purdy, G.B.3
-
7
-
-
0002152920
-
Assuring Ownership Rights for Digital Images;
-
Vieweg, Wiesbaden, [C95]
-
[C95] Germano Caronni: Assuring Ownership Rights for Digital Images; Proceedings VIS'95; Vieweg, Wiesbaden 1995, 251-263.
-
(1995)
Proceedings VIS'95;
, pp. 251-263
-
-
Caronni, G.1
-
8
-
-
84864708144
-
Multiparty computations ensuring privacy of each party's input and correctness of the result;
-
LNCS 293, Springer-Verlag, Berlin, [CDG88]
-
[CDG88] David Chaum, Ivan B. Damgård, Jeroen van de Graaf: Multiparty computations ensuring privacy of each party's input and correctness of the result; Crypto'87, LNCS 293, Springer-Verlag, Berlin 1988, 87-119.
-
(1988)
Crypto'87
, pp. 87-119
-
-
Chaum, D.1
Damgård, I.B.2
van de Graaf, J.3
-
9
-
-
0022188127
-
A robust and verifiable cryptographically secure election scheme;
-
[CF85]
-
[CF85] Josh D. Cohen, Michael J. Fischer: A robust and verifiable cryptographically secure election scheme; 26th FOCS, 1985, 372-382.
-
(1985)
26th FOCS
, pp. 372-382
-
-
Cohen, J.D.1
Fischer, M.J.2
-
10
-
-
84985922619
-
Tracing traitors
-
LNCS 839, Springer-Verlag, Berlin, [CFN94]
-
[CFN94] Benny Chor, Amos Fiat, Moni Naor: Tracing traitors',Crypto'94, LNCS 839, Springer-Verlag, Berlin 1994, 257-270.
-
(1994)
Crypto'94
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
11
-
-
0029308984
-
Copyright Protection for Electronic Publishing Over Computer Networks;
-
[CMP95]
-
[CMP95] Abhijit K. Choudhury, Nicholas F. Maxemchuk, Sanjoy Paul, Henning G. Schulzrinne: Copyright Protection for Electronic Publishing Over Computer Networks;IEEE Network 9/3 (1995) 12-20.
-
(1995)
IEEE Network
, vol.9
, Issue.3
, pp. 12-20
-
-
Choudhury, A.K.1
Maxemchuk, N.F.2
Paul, S.3
Schulzrinne, H.G.4
-
12
-
-
0023547498
-
Towards a Theory of Software Protection and Simulation by Oblivious RAMs;
-
[G87]
-
[G87] Oded Goldreich: Towards a Theory of Software Protection and Simulation by Oblivious RAMs;19th STOC, 1987, 182-194.
-
(1987)
19th STOC
, pp. 182-194
-
-
Goldreich, O.1
-
13
-
-
0023545076
-
How to play any mental game - or - A completeness theorem for protocols with honest majority;
-
[GMW87]
-
[GMW87] Oded Goldreich, Silvio Micali, Avi Wigderson: How to play any mental game - or - a completeness theorem for protocols with honest majority;19th STOC, 1987, 218-229.
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
85028761718
-
A simple and secure way to show the validity of your public key;
-
LNCS 293, Springer-Verlag, Berlin, [GP88]
-
[GP88] Jeroen van de Graaf, René Peralta: A simple and secure way to show the validity of your public key;Crypto'87, LNCS 293, Springer-Verlag, Berlin 1988, 128-134.
-
(1988)
Crypto'87
, pp. 128-134
-
-
van de Graaf, J.1
Peralta, R.2
-
15
-
-
84936892450
-
Cryptology for Digital TV Broadcasting;
-
[MQ95]
-
[MQ95] Benoit M. Macq, Jean-Jacques Quisquater: Cryptology for Digital TV Broadcasting;Proceedings of the IEEE 83/6 (1995) 944-957.
-
(1995)
Proceedings of the IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.M.1
Quisquater, J.-J.2
-
17
-
-
84944981072
-
An efficient software protection scheme;
-
LNCS 435, Springer-Verlag, Heidelberg, [090]
-
[090] Rafail Ostrovsky: An efficient software protection scheme;Crypto'89, LNCS 435, Springer-Verlag, Heidelberg 1990, 610-611.
-
(1990)
Crypto'89
, pp. 610-611
-
-
Ostrovsky, R.1
-
19
-
-
0022882770
-
How to Generate and Exchange Secrets;
-
[Y86]
-
[Y86] Andrew Chi-Chih Yao: How to Generate and Exchange Secrets;27th FOCS, 1986, 162-167.
-
(1986)
27th FOCS
, pp. 162-167
-
-
Chi-Chih, A.Y.1
|