Verifiable computing

Results: 55



#Item
11Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-09-07 07:03:05
122013 IEEE Symposium on Security and Privacy  Pinocchio: Nearly Practical Verifiable Computation Bryan Parno Jon Howell Microsoft Research

2013 IEEE Symposium on Security and Privacy Pinocchio: Nearly Practical Verifiable Computation Bryan Parno Jon Howell Microsoft Research

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:30
13Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby⋆ , Srinath Setty† , Zuocheng Ren† , Andrew J. Blumberg† , and Michael Walfish⋆ ⋆ †

Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby⋆ , Srinath Setty† , Zuocheng Ren† , Andrew J. Blumberg† , and Michael Walfish⋆ ⋆ †

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English
14Trusty URIs: Verifiable, Immutable, and Permanent Digital Artifacts for Linked Data Tobias Kuhn1 and Michel Dumontier2 1  arXiv:1401.5775v3 [cs.CR] 28 May 2014

Trusty URIs: Verifiable, Immutable, and Permanent Digital Artifacts for Linked Data Tobias Kuhn1 and Michel Dumontier2 1 arXiv:1401.5775v3 [cs.CR] 28 May 2014

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-05-28 22:07:51
15MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2012-01-17 23:19:33
16Computing on Encrypted Data Secure Internet of Things Seminar David Wu January, 2015  New Applications in the Internet of Things

Computing on Encrypted Data Secure Internet of Things Seminar David Wu January, 2015 New Applications in the Internet of Things

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2015-01-12 23:28:56
17An Equational Approach to Secure Multi-party Computation∗ Daniele Micciancio† Stefano Tessaro‡  January 12, 2013

An Equational Approach to Secure Multi-party Computation∗ Daniele Micciancio† Stefano Tessaro‡ January 12, 2013

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-09-26 16:14:53
18Intrusion-Tolerant Group Management for Mobile Ad-Hoc Networks Jonathan Kirsch1 and Brian Coan2 Johns Hopkins University, Baltimore, MD.  Telcordia Technologies, Piscataway, NJ.

Intrusion-Tolerant Group Management for Mobile Ad-Hoc Networks Jonathan Kirsch1 and Brian Coan2 Johns Hopkins University, Baltimore, MD. Telcordia Technologies, Piscataway, NJ.

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
19HEtest: A Homomorphic Encryption Testing Framework Mayank Varia1 , Sophia Yakoubov1 , and Yang Yang2,? 1 MIT Lincoln Laboratory?? , {mayank.varia, sophia.yakoubov}@ll.mit.edu 2

HEtest: A Homomorphic Encryption Testing Framework Mayank Varia1 , Sophia Yakoubov1 , and Yang Yang2,? 1 MIT Lincoln Laboratory?? , {mayank.varia, sophia.yakoubov}@ll.mit.edu 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-02 17:15:17
20Incentivized Outsourced Computation Resistant to Malicious Contractors Alptekin K¨ up¸cu ¨ Ko¸c University

Incentivized Outsourced Computation Resistant to Malicious Contractors Alptekin K¨ up¸cu ¨ Ko¸c University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-12 03:44:26