Verifiable computing

Results: 55



#Item
21BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing Kai Chen CSE, HKUST

BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing Kai Chen CSE, HKUST

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2014-07-01 23:45:38
22TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, and Roberto Trifiletti ???

TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, and Roberto Trifiletti ???

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-04 01:46:16
23Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption∗ Jonathan Katz† Aishwarya Thiruvengadam‡

Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption∗ Jonathan Katz† Aishwarya Thiruvengadam‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 12:50:07
24VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff M. Frans Kaashoek  Nickolai Zeldovich

VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff M. Frans Kaashoek Nickolai Zeldovich

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-12 14:05:59
25IncaMail Confidential and verifiable e-mailing. Powered by

IncaMail Confidential and verifiable e-mailing. Powered by

Add to Reading List

Source URL: www.post.ch

Language: English
26On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation? Yuval Ishai1 , Eyal Kushilevitz1 , Yehuda Lindell2?? , and Erez Petrank1 1  Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)

On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation? Yuval Ishai1 , Eyal Kushilevitz1 , Yehuda Lindell2?? , and Erez Petrank1 1 Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
27Cryptographic Support for Fault-Tolerant Distributed Computing* Yaron Minsky t Robbert van Renesse  Fred B. Schneider t

Cryptographic Support for Fault-Tolerant Distributed Computing* Yaron Minsky t Robbert van Renesse Fred B. Schneider t

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 22:37:04
28APSS: Proactive Secret Sharing in Asynchronous Systems LIDONG ZHOU Microsoft Research Silicon Valley FRED B. SCHNEIDER and ROBBERT VAN RENESSE Cornell University

APSS: Proactive Secret Sharing in Asynchronous Systems LIDONG ZHOU Microsoft Research Silicon Valley FRED B. SCHNEIDER and ROBBERT VAN RENESSE Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-16 17:01:48
29The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark

The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-09-09 06:11:33
30PRivacy Enabled Capability In Co-Operative Systems and Safety Applications Deliverable 7 V2X Privacy Verifiable Architecture

PRivacy Enabled Capability In Co-Operative Systems and Safety Applications Deliverable 7 V2X Privacy Verifiable Architecture

Add to Reading List

Source URL: www.preciosa-project.org

Language: English - Date: 2010-08-31 01:34:54