Verifiable computing

Results: 55



#Item
41Outsourcing / Cloud infrastructure / Cloud storage / Trusted Computing / NP / Cloud computing / Centralized computing / Computing

Verifiable Resource Accounting for Cloud Computing Services Vyas Sekar Petros Maniatis

Add to Reading List

Source URL: scrub.cs.berkeley.edu

Language: English - Date: 2012-01-11 13:39:09
42Security / Cyberwarfare / Cipher / Applied mathematics / RSA / Verifiable computing / Probabilistic encryption / Cryptography / Public-key cryptography / Homomorphic encryption

Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond Shafi Goldwasser? Yael Kalai† Raluca Ada Popa? Vinod Vaikuntanathan./

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
43Computing / USB flash drive / Configuration file / Computer file

A Process for Verifiable Digital Evidence and Data Preservation John Tebbutt and Doug White Disclaimer

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2008-02-25 16:05:54
44Operations research / Applied mathematics / Heuristic / Problem solving / Algorithm / Bjarne Stroustrup / Mathematical optimization / Scientific modelling / C++ / Computing / Theoretical computer science / Software engineering

Practical and Verifiable C++ Dynamic Cast for Hard Real-Time Systems Damian Dechev, Rabi Mahapatra, Bjarne Stroustrup The dynamic cast operation allows flexibility in the design and use of data management facilities in o

Add to Reading List

Source URL: www.stroustrup.com

Language: English - Date: 2012-10-03 14:24:46
45Digital signature / Threshold cryptosystem / Verifiable secret sharing / Public-key cryptography / Secret sharing / RSA / BLS / Full Domain Hash / Blind signature / Cryptography / Group signature / Homomorphic encryption

To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-09 19:28:02
46XOR gate / Circuit / XNOR gate / OR gate / Electronic circuit / Boolean circuit / Exclusive or / Verifiable computing / Theoretical computer science / Logic gates / Electronics

Secure Two-Party Computation is Practical Benny Pinkas1 , Thomas Schneider2 , Nigel P. Smart3 , and Stephen C. Williams3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-02 03:58:11
47Digital signature / Threshold cryptosystem / Verifiable secret sharing / Public-key cryptography / Secret sharing / RSA / BLS / Full Domain Hash / Blind signature / Cryptography / Group signature / Homomorphic encryption

To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2014-05-09 19:28:02
48Voting / Electoral systems / Election technology / Election fraud / Electronic voting / Information society / Ballot / Secret ballot / Voting machine / Politics / Elections / Government

Testing Voters’ Understanding of a Security Mechanism used in Verifiable Voting Morgan Llewellyn1 , Steve Schneider2 , Zhe Xia3 , Chris Culnane2 , James Heather2 , Peter Y.A. Ryan4 and Sriramkrishnan Srinivasan2 1 IMT

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
49Information society / Homomorphic encryption / Probabilistic encryption / Proxy re-encryption / ElGamal encryption / Ciphertext / Blind signature / RSA / Prêt à Voter / Cryptography / Public-key cryptography / Electronic voting

Chapter 69 Verifiable Voting Systems Thea Peacock1 , Peter Y. A. Ryan1 , Steve Schneider2 and Zhe Xia2 1

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
50Computing / Google / Bing / AdWords / Price comparison service / AdSense / Criticism of Google / World Wide Web / Internet search engines / Internet

Assessing the Legitimacy of a Google Penalty A Proposal for a Reliable, Robust, and Verifiable Method for Assessing the Legitimacy of a Given Penalty, Demotion, or Ranking Signal

Add to Reading List

Source URL: www.foundem.co.uk

Language: English - Date: 2013-05-14 09:15:48
UPDATE