Back to Results
First PageMeta Content
Computing / Cryptographic protocols / Models of computation / Universal composability / Turing machine / Security parameter / Computational complexity theory / Actor model / Ciphertext indistinguishability / Theoretical computer science / Applied mathematics / Cryptography


DattaKuestersMitchellRamanathan-TCC-2005.dvi
Add to Reading List

Document Date: 2007-12-18 01:20:50


Open Document

File Size: 216,71 KB

Share Result on Facebook

City

Kiel / /

Country

Germany / United States / /

Currency

pence / /

/

Facility

Stanford University / /

IndustryTerm

bounded replication operator / concurrent systems / transformations to systems / multiparty protocols / real and ideal protocol / security protocols / functionality/protocol / /

Organization

office of Naval Research / Department of Defense / National Science Foundation / Institut f¨ / Stanford University / /

Position

second author was / guard / Guard PPT Guard computation Guard Guard / /

ProgrammingLanguage

K / /

SportsLeague

Stanford University / /

TVStation

WBB / /

Technology

cryptography / security protocols / Simulation / same protocol / real protocol / /

SocialTag