Secret sharing

Results: 195



#Item
31Cryptography / Verifiable secret sharing / Secret sharing / Secure multi-party computation / Net / Cheap talk / Constructible universe / Expected value / Quantum Byzantine agreement / Stable distribution

Scalable Rational Secret Sharing [Extended Abstract] Varsha Dani Mahnush Movahedi

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
32Photo sharing / Video software / Social networking services / Instagram / Mobile software / Terms of service / 17 / Mobile app / Secret / Asia Pulp & Paper / Microsoft App-V / IOS app approvals

Sherpa ToU + PPpages

Add to Reading List

Source URL: trysherpa.com

Language: English - Date: 2016-08-18 10:12:56
33Public-key cryptography / Cryptography / Homeomorphisms / Homomorphic encryption / Secure multi-party computation / Paillier cryptosystem / Communications protocol / Cryptographic protocol / Secret sharing / Data Encryption Standard

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2014-05-12 11:51:10
34

Optimal information rate of secret sharing schemes on trees L´aszl´o Csirmaz∗ G´abor Tardos†

Add to Reading List

Source URL: www.renyi.hu

Language: English - Date: 2012-10-25 08:38:58
    35Cryptography / Pico / Public-key cryptography / Secret sharing / RSA / Secure cryptoprocessor / Cryptographic nonce / Password

    1 Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank Stajano

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2012-06-23 18:45:47
    36Computer access control / Authentication / Secret sharing / Security token / Pico / Wi-Fi / Server / Password

    To Have and Have Not: Variations on Secret Sharing to Model User Presence Quentin Stafford-Fraser University of Cambridge Computer Lab

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2014-07-05 13:33:42
    37

    Lecture Notes on SECRET SHARING Exposition by Bill Gasarch 1 Introduction

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2016-01-13 14:24:25
      38Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

      Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2016-05-17 22:04:37
      39Decision theory / Nash equilibrium / Game theory / Cryptography / Verifiable secret sharing / Bayesian game

      journal of economic theory 83, 69article no. ET982444 Secure Protocols or How Communication Generates Correlation Olivier Gossner*

      Add to Reading List

      Source URL: ogossner.free.fr

      Language: English - Date: 2005-10-17 11:53:01
      40

      Microsoft PowerPoint - lec7-secret-sharing

      Add to Reading List

      Source URL: inst.eecs.berkeley.edu

      Language: English - Date: 2008-09-22 12:05:38
        UPDATE