Verifiable computing

Results: 55



#Item
31Private and Verifiable Interdomain Routing Decisions Mingchen Zhao Wenchao Zhou  Alexander J. T. Gurney

Private and Verifiable Interdomain Routing Decisions Mingchen Zhao Wenchao Zhou Alexander J. T. Gurney

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2012-07-30 10:52:47
32VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff M. Frans Kaashoek  Nickolai Zeldovich

VerSum: Verifiable Computations over Large Public Logs Jelle van den Hooff M. Frans Kaashoek Nickolai Zeldovich

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
33Abstract Authenticated dictionaries are a widely discussed paradigm to enable verifiable integrity for data storage on untrusted servers, such as today’s widely used “cloud computing” resources, allowing a server t

Abstract Authenticated dictionaries are a widely discussed paradigm to enable verifiable integrity for data storage on untrusted servers, such as today’s widely used “cloud computing” resources, allowing a server t

Add to Reading List

Source URL: tamperevident.cs.rice.edu

Language: English - Date: 2010-12-14 09:04:54
34Cryptography Research Group X0 X1

Cryptography Research Group X0 X1

Add to Reading List

Source URL: www.seas.virginia.edu

Language: English - Date: 2013-08-27 15:09:41
35MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2012-01-17 23:19:33
36Pinocchio: Nearly Practical Verifiable Computation Bryan Parno Jon Howell Microsoft Research  Craig Gentry

Pinocchio: Nearly Practical Verifiable Computation Bryan Parno Jon Howell Microsoft Research Craig Gentry

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-03-06 18:09:31
37Reusable Garbled Circuits and Succinct Functional Encryption Shafi Goldwasser⋆ Yael Kalai† Raluca Ada Popa⋆ Vinod Vaikuntanathan◃▹

Reusable Garbled Circuits and Succinct Functional Encryption Shafi Goldwasser⋆ Yael Kalai† Raluca Ada Popa⋆ Vinod Vaikuntanathan◃▹

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-05-12 22:36:25
38MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

Add to Reading List

Source URL: www.pmg.csail.mit.edu

Language: English - Date: 2012-01-17 23:19:33
39Fault-Tolerant Distributed Computing in Full-Information Networks Shafi Goldwasser∗ CSAIL, MIT Cambridge MA, USA  Elan Pavlov

Fault-Tolerant Distributed Computing in Full-Information Networks Shafi Goldwasser∗ CSAIL, MIT Cambridge MA, USA Elan Pavlov

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:28:28