Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Reducing the Overhead of MPC over a Large Population
Choudhury, Ashish, Patra, Arpita, Smart, Nigel P.
Published in Security and Cryptography for Networks (2014)
Published in Security and Cryptography for Networks (2014)
Get full text
Book Chapter
Loading…
Secure Key Exchange and Sessions without Credentials
Canetti, Ran, Kolesnikov, Vladimir, Rackoff, Charles, Vahlis, Yevgeniy
Published in Security and Cryptography for Networks (2014)
Published in Security and Cryptography for Networks (2014)
Get full text
Book Chapter
Loading…
Relaxed Two-to-One Recoding Schemes
Pandey, Omkant, Ramchen, Kim, Waters, Brent
Published in Security and Cryptography for Networks (2014)
Published in Security and Cryptography for Networks (2014)
Get full text
Book Chapter
Loading…
Loading…
Efficient Network-Based Enforcement of Data Access Rights
Giura, Paul, Kolesnikov, Vladimir, Tentes, Aris, Vahlis, Yevgeniy
Published in Security and Cryptography for Networks (2014)
Published in Security and Cryptography for Networks (2014)
Get full text
Book Chapter