21![BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing Kai Chen CSE, HKUST BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing Kai Chen CSE, HKUST](https://www.pdfsearch.io/img/16e416e35fbecbc2c21a003cba86ab12.jpg) | Add to Reading ListSource URL: www.cse.ust.hkLanguage: English - Date: 2014-07-01 23:45:38
|
---|
22![TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, and Roberto Trifiletti ??? TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, and Roberto Trifiletti ???](https://www.pdfsearch.io/img/ebd83b9eba92640b80cc8043f703fd13.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-04 01:46:16
|
---|
23![Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption∗ Jonathan Katz† Aishwarya Thiruvengadam‡ Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption∗ Jonathan Katz† Aishwarya Thiruvengadam‡](https://www.pdfsearch.io/img/cb8290132cfb6ef777f121619bfa841a.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-03-24 12:50:07
|
---|
24![VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff M. Frans Kaashoek Nickolai Zeldovich VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff M. Frans Kaashoek Nickolai Zeldovich](https://www.pdfsearch.io/img/be4ba7c0f08913c21cfe40960fd467be.jpg) | Add to Reading ListSource URL: pdos.csail.mit.eduLanguage: English - Date: 2015-04-12 14:05:59
|
---|
25![IncaMail Confidential and verifiable e-mailing. Powered by IncaMail Confidential and verifiable e-mailing. Powered by](https://www.pdfsearch.io/img/7f4ebab8db3db90a88f612ff0278ccfe.jpg) | Add to Reading ListSource URL: www.post.chLanguage: English |
---|
26![On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation? Yuval Ishai1 , Eyal Kushilevitz1 , Yehuda Lindell2?? , and Erez Petrank1 1 Technion ({yuvali,eyalk,erez}@cs.technion.ac.il) On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation? Yuval Ishai1 , Eyal Kushilevitz1 , Yehuda Lindell2?? , and Erez Petrank1 1 Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)](https://www.pdfsearch.io/img/6a6b3a6cbd3a96784503abcfe7e3ec5d.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2008-09-15 00:54:55
|
---|
27![Cryptographic Support for Fault-Tolerant Distributed Computing* Yaron Minsky t Robbert van Renesse Fred B. Schneider t Cryptographic Support for Fault-Tolerant Distributed Computing* Yaron Minsky t Robbert van Renesse Fred B. Schneider t](https://www.pdfsearch.io/img/0f909f591dca31d4a33f054993f809ac.jpg) | Add to Reading ListSource URL: www.cs.cornell.eduLanguage: English - Date: 2013-09-09 22:37:04
|
---|
28![APSS: Proactive Secret Sharing in Asynchronous Systems LIDONG ZHOU Microsoft Research Silicon Valley FRED B. SCHNEIDER and ROBBERT VAN RENESSE Cornell University APSS: Proactive Secret Sharing in Asynchronous Systems LIDONG ZHOU Microsoft Research Silicon Valley FRED B. SCHNEIDER and ROBBERT VAN RENESSE Cornell University](https://www.pdfsearch.io/img/408ef2e221e91bf90672383a414cc5fe.jpg) | Add to Reading ListSource URL: www.cs.cornell.eduLanguage: English - Date: 2005-11-16 17:01:48
|
---|
29![The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark](https://www.pdfsearch.io/img/780850f338c4bb31c4f83e9d4620c65a.jpg) | Add to Reading ListSource URL: cryptome.orgLanguage: English - Date: 2014-09-09 06:11:33
|
---|
30![PRivacy Enabled Capability In Co-Operative Systems and Safety Applications Deliverable 7 V2X Privacy Verifiable Architecture PRivacy Enabled Capability In Co-Operative Systems and Safety Applications Deliverable 7 V2X Privacy Verifiable Architecture](https://www.pdfsearch.io/img/ad6890b8e8a44817e0614732f836f3cc.jpg) | Add to Reading ListSource URL: www.preciosa-project.orgLanguage: English - Date: 2010-08-31 01:34:54
|
---|