11![BRICS DS-04-3 J. Groth: Honest Verifier Zero-knowledge Arguments Applied BRICS Basic Research in Computer Science BRICS DS-04-3 J. Groth: Honest Verifier Zero-knowledge Arguments Applied BRICS Basic Research in Computer Science](https://www.pdfsearch.io/img/3cd7d86d80bb8cc85ba0e06d074a6b26.jpg) | Add to Reading ListSource URL: www.brics.dkLanguage: English - Date: 2005-04-06 04:06:17
|
---|
12![Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner](https://www.pdfsearch.io/img/266c79570010f4152f1f7bee24d8e2e7.jpg) | Add to Reading ListSource URL: naveen.ksastry.comLanguage: English - Date: 2013-06-08 15:25:49
|
---|
13![CS 70 SPRING 2008 — DISCUSSION #4 LUQMAN HODGKINSON, AARON KLEINMAN, MIN XU 1. Just Division Exercise 1. After Alice, Bob, and Carol died, God decided to punish their gluttony by forcing them to divide and eat cakes fo CS 70 SPRING 2008 — DISCUSSION #4 LUQMAN HODGKINSON, AARON KLEINMAN, MIN XU 1. Just Division Exercise 1. After Alice, Bob, and Carol died, God decided to punish their gluttony by forcing them to divide and eat cakes fo](https://www.pdfsearch.io/img/303efa644e1eb3c6e1b8610bc0fee71a.jpg) | Add to Reading ListSource URL: www.cs.berkeley.edu- Date: 2015-01-21 19:48:43
|
---|
14![CS 161 Computer Security Fall 2005 CS 161 Computer Security Fall 2005](https://www.pdfsearch.io/img/392142cd589014c15ed1b21840ebedf3.jpg) | Add to Reading ListSource URL: www-inst.eecs.berkeley.eduLanguage: English - Date: 2005-12-13 23:10:13
|
---|
15![U.C. Berkeley CS276: Cryptography Professor David Wagner Lecture 28 April 27, 2006 U.C. Berkeley CS276: Cryptography Professor David Wagner Lecture 28 April 27, 2006](https://www.pdfsearch.io/img/8105be3e34db2b049a0ad98c39897334.jpg) | Add to Reading ListSource URL: www.cs.berkeley.eduLanguage: English - Date: 2015-01-21 19:48:43
|
---|
16![One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be](https://www.pdfsearch.io/img/4236d3421162465efd56c1cf4c9e3693.jpg) | Add to Reading ListSource URL: www.zurich.ibm.comLanguage: English - Date: 2000-04-12 11:39:28
|
---|
17![Peer-to-Peer Systems and Security Attacks! Christian Grothoff Technische Universit¨ at M¨ unchen Peer-to-Peer Systems and Security Attacks! Christian Grothoff Technische Universit¨ at M¨ unchen](https://www.pdfsearch.io/img/6291c313bbabbbb292651a1f3a4fd1ab.jpg) | Add to Reading ListSource URL: grothoff.orgLanguage: English - Date: 2013-06-04 10:22:31
|
---|
18![Security Analysis of Accountable Anonymity in Dissent EWA SYTA, HENRY CORRIGAN-GIBBS, SHU-CHUN WENG, DAVID WOLINSKY, and BRYAN FORD, Yale University AARON JOHNSON, U.S. Naval Research Laboratory Users often wish to comm Security Analysis of Accountable Anonymity in Dissent EWA SYTA, HENRY CORRIGAN-GIBBS, SHU-CHUN WENG, DAVID WOLINSKY, and BRYAN FORD, Yale University AARON JOHNSON, U.S. Naval Research Laboratory Users often wish to comm](https://www.pdfsearch.io/img/9057f8b0994eafc378850fd0b691f474.jpg) | Add to Reading ListSource URL: www.ohmygodel.comLanguage: English - Date: 2014-08-17 14:47:48
|
---|
19![On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1 On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1](https://www.pdfsearch.io/img/184bd4695e6cfef7609a81413239ded5.jpg) | Add to Reading ListSource URL: www.cypherpunks.caLanguage: English - Date: 2009-11-13 20:20:01
|
---|
20![A Machine-Checked Formalization of Σ-Protocols Santiago Zanella-B´eguelin1 Gilles Barthe1 Daniel Hedin1 Benjamin Gr´egoire2 Sylvain Heraud2 1 IMDEA A Machine-Checked Formalization of Σ-Protocols Santiago Zanella-B´eguelin1 Gilles Barthe1 Daniel Hedin1 Benjamin Gr´egoire2 Sylvain Heraud2 1 IMDEA](https://www.pdfsearch.io/img/ee7d52bf2de7b2d635d36d3eda65f1c4.jpg) | Add to Reading ListSource URL: software.imdea.orgLanguage: English - Date: 2013-03-13 12:33:24
|
---|