Back to Results
First PageMeta Content
Trusted third party / Trusted Computing / Secure multi-party computation / Secret sharing / ACM SIGACT / Trusted timestamping / Verifiable secret sharing / Threshold cryptosystem / Secure two-party computation / Cryptography / Cryptographic protocols / Public-key cryptography


Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review
Add to Reading List

Document Date: 2013-05-16 05:06:00


Open Document

File Size: 2,48 MB

Share Result on Facebook
UPDATE