Verifiable computing

Results: 55



#Item
1Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing

Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:58
    2DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities? Siamak F. Shahandashti and Feng Hao School of Computing Science, Newcastle University, UK {siamak.shahandashti,feng.hao}@ncl.ac.uk

    DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities? Siamak F. Shahandashti and Feng Hao School of Computing Science, Newcastle University, UK {siamak.shahandashti,feng.hao}@ncl.ac.uk

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-07-11 13:13:34
    3Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing∗ Changyu Dong† Newcastle University Newcastle Upon Tyne, UK

    Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing∗ Changyu Dong† Newcastle University Newcastle Upon Tyne, UK

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2017-09-04 21:03:20
      4Verifiable Programming of Object-Oriented and Distributed Systems∗ Olaf Owe University of Oslo, Department of Informatics, Oslo, Norway, and University of California, Santa Cruz, Department of Computer Science, USA Apr

      Verifiable Programming of Object-Oriented and Distributed Systems∗ Olaf Owe University of Oslo, Department of Informatics, Oslo, Norway, and University of California, Santa Cruz, Department of Computer Science, USA Apr

      Add to Reading List

      Source URL: heim.ifi.uio.no

      Language: English - Date: 2016-05-04 09:09:45
      5Verifiable Computation Advisor(s): Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

      Verifiable Computation Advisor(s): Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

      Add to Reading List

      Source URL: www.iaik.tugraz.at

      Language: English - Date: 2015-09-08 06:00:03
      6Declarative Verifiable SDI Specifications Rick McGeer US Ignite   ABSTRACT

      Declarative Verifiable SDI Specifications Rick McGeer US Ignite ABSTRACT

      Add to Reading List

      Source URL: spw16.langsec.org

      Language: English - Date: 2016-06-05 23:38:43
      7Homomorphic Signatures for Verifiable Computing Advisor(s): Christian Hanser Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

      Homomorphic Signatures for Verifiable Computing Advisor(s): Christian Hanser Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

      Add to Reading List

      Source URL: www.iaik.tugraz.at

      Language: English - Date: 2015-11-30 11:00:03
      8Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions? Veronika Kuchta and Mark Manulis Department of Computing, University of Surrey, United Kingdom , mark@manulis

      Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions? Veronika Kuchta and Mark Manulis Department of Computing, University of Surrey, United Kingdom , mark@manulis

      Add to Reading List

      Source URL: manulis.eu

      Language: English - Date: 2013-12-30 10:23:09
        9Robustness and device independence of verifiable blind quantum computing Alexandru Gheorghiu,1 Elham Kashefi,1, 2 and Petros Wallden1 2 1 School of Informatics, University of Edinburgh, 10 Crichton Street, Edinburgh EH8

        Robustness and device independence of verifiable blind quantum computing Alexandru Gheorghiu,1 Elham Kashefi,1, 2 and Petros Wallden1 2 1 School of Informatics, University of Edinburgh, 10 Crichton Street, Edinburgh EH8

        Add to Reading List

        Source URL: 2015.qcrypt.net

        Language: English - Date: 2015-09-14 07:34:45
          10Appeared in the 23rd Annual IFIP WG 11.3 Working Conference on Data and Application Security, 2009, pp. 252–267.  Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Te

          Appeared in the 23rd Annual IFIP WG 11.3 Working Conference on Data and Application Security, 2009, pp. 252–267. Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Te

          Add to Reading List

          Source URL: www.uncg.edu

          Language: English - Date: 2009-10-01 15:00:03