|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7 occurrences of 7 keywords
|
|
|
Results
Found 6 publication records. Showing 6 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
103 | Velik Bellemin, Tadashi Araragi |
CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DepCoS-RELCOMEX ![In: 2006 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2006), 24-28 May 2006, Szklarska Poreba, Poland, pp. 240-247, 2006, IEEE Computer Society, 0-7695-2565-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
70 | Tomas Sander, Adam L. Young, Moti Yung |
Non-Interactive CryptoComputing For NC1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 40th Annual Symposium on Foundations of Computer Science, FOCS '99, 17-18 October, 1999, New York, NY, USA, pp. 554-567, 1999, IEEE Computer Society, 0-7695-0409-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
cryptocomputing, cryptography, public key, complexity theory, homomorphic encryption, secure computation |
37 | Simon Fau |
Cryptocomputing systems, compilation and runtime. (Systèmes de cryptocalculs, compilation et support d'exécution). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
37 | Helger Lipmaa |
Private Branching Programs: On Communication-Efficient Cryptocomputing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 107, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
37 | Pierre-Alain Fouque, Jacques Stern, Jan-Geert Wackers |
CryptoComputing with Rationals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 6th International Conference, FC 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers, pp. 136-146, 2002, Springer, 3-540-00646-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
33 | Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung |
Two-Party Computing with Encrypted Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 298-314, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Computing with Encrypted Data, CryptoComputing, oblivious transfer, Secure Two-Party Computation |
Displaying result #1 - #6 of 6 (100 per page; Change: )
|
|