First Page | Document Content | |
---|---|---|
Date: 2011-02-19 14:29:40Cryptography Secure multi-party computation Secure two-party computation Ciphertext indistinguishability Consensus Secret sharing IP Control theory | MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hirAdd to Reading ListSource URL: www.cs.rpi.eduDownload Document from Source WebsiteFile Size: 247,36 KBShare Document on Facebook |
Third Call for Papers TOPICS 21st International Conference on System Theory, Control andDocID: 1vrw3 - View Document | |
A Dynamic Field Theory Based Pilot Model To Control Aircraft Pitch Attitudes Yasin Kaygusuz () TAI, Turkish Aerospace Industries, Fethiye Mah., Havacılık blv. No17, Akıncı, Kazan 06980, Ankara, TuDocID: 1vmTp - View Document | |
New Mathematical Tools in Reach Control Theory by Melkior OrnikDocID: 1vm3Q - View Document | |
IMPLICIT DISCRETIZATION IN SLIDING-MODE CONTROL: THEORY AND EXPERIMENTS IMPLICIT DISCRETIZATION IN SLIDING-MODE CONTROL: THEORY AND EXPERIMENTS Bernard Brogliato, INRIA GrenobleDocID: 1v4sN - View Document | |
References Summer School on Time Delay Equations and Control Theory Dobbiaco, June 25–DocID: 1uZZa - View Document |