31![Private and Verifiable Interdomain Routing Decisions Mingchen Zhao Wenchao Zhou Alexander J. T. Gurney Private and Verifiable Interdomain Routing Decisions Mingchen Zhao Wenchao Zhou Alexander J. T. Gurney](https://www.pdfsearch.io/img/5fb0070b78cfacfc2563aef0c1da54ce.jpg) | Add to Reading ListSource URL: www.cis.upenn.eduLanguage: English - Date: 2012-07-30 10:52:47
|
---|
32![VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff M. Frans Kaashoek Nickolai Zeldovich VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff M. Frans Kaashoek Nickolai Zeldovich](https://www.pdfsearch.io/img/e9ffb8d22bb5a72853a83a7e61f5bc54.jpg) | Add to Reading ListSource URL: people.csail.mit.eduLanguage: English |
---|
33![Abstract Authenticated dictionaries are a widely discussed paradigm to enable verifiable integrity for data storage on untrusted servers, such as today’s widely used “cloud computing” resources, allowing a server t Abstract Authenticated dictionaries are a widely discussed paradigm to enable verifiable integrity for data storage on untrusted servers, such as today’s widely used “cloud computing” resources, allowing a server t](https://www.pdfsearch.io/img/9711770cdb5681b494ea532efce091c4.jpg) | Add to Reading ListSource URL: tamperevident.cs.rice.eduLanguage: English - Date: 2010-12-14 09:04:54
|
---|
34![Cryptography Research Group X0 X1 Cryptography Research Group X0 X1](https://www.pdfsearch.io/img/f19df60578d64301451c59f893e5f05c.jpg) | Add to Reading ListSource URL: www.seas.virginia.eduLanguage: English - Date: 2013-08-27 15:09:41
|
---|
35![MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation](https://www.pdfsearch.io/img/34d0e7d0be8e7ace5fbb8a978d40de3c.jpg) | Add to Reading ListSource URL: pmg.csail.mit.eduLanguage: English - Date: 2012-01-17 23:19:33
|
---|
36![Pinocchio: Nearly Practical Verifiable Computation Bryan Parno Jon Howell Microsoft Research Craig Gentry Pinocchio: Nearly Practical Verifiable Computation Bryan Parno Jon Howell Microsoft Research Craig Gentry](https://www.pdfsearch.io/img/46d94fcd9c6682bbf16496d1072c51f0.jpg) | Add to Reading ListSource URL: research.microsoft.comLanguage: English - Date: 2014-03-06 18:09:31
|
---|
37![Reusable Garbled Circuits and Succinct Functional Encryption Shafi Goldwasser⋆ Yael Kalai† Raluca Ada Popa⋆ Vinod Vaikuntanathan◃▹ Reusable Garbled Circuits and Succinct Functional Encryption Shafi Goldwasser⋆ Yael Kalai† Raluca Ada Popa⋆ Vinod Vaikuntanathan◃▹](https://www.pdfsearch.io/img/6961e20ef0efe4fd50e940198d5dbec1.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-05-12 22:36:25
|
---|
38![MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation](https://www.pdfsearch.io/img/af8f2a369c070a5936656df7d59214bc.jpg) | Add to Reading ListSource URL: www.pmg.csail.mit.eduLanguage: English - Date: 2012-01-17 23:19:33
|
---|
39![Fault-Tolerant Distributed Computing in Full-Information Networks Shafi Goldwasser∗ CSAIL, MIT Cambridge MA, USA Elan Pavlov Fault-Tolerant Distributed Computing in Full-Information Networks Shafi Goldwasser∗ CSAIL, MIT Cambridge MA, USA Elan Pavlov](https://www.pdfsearch.io/img/ac430cd487abcdb63002d228c5777435.jpg) | Add to Reading ListSource URL: people.csail.mit.eduLanguage: English - Date: 2010-02-04 10:28:28
|
---|