×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [secure computation]
How to Ask Someone Out Eric Price. Just Do It Get her alone
219 views
1 Secure Computation in the Real(ish) World David Evans University of Virginia Carnegie Mellon
214 views
Provable Protocols for Unlinkability Ron Berman, Amos Fiat, Amnon Ta-Shma Tel Aviv University
219 views
Secure Computation of the k’th Ranked Element Gagan Aggarwal Stanford University Joint work with Nina Mishra and Benny Pinkas, HP Labs
217 views
Biometric Security and Privacy Module 2.1 By Bon Sy (editor) Queens College/CUNY, Computer Science Note: 1. This slide set is on-going and a collaborative
215 views
Implementing e-Auctions with Sharemind Md. Sadek Ferdous 12th November 2008
215 views
1 How to Prove that Minicrypt=Cryptomania (in the future) Danny Harnik Moni Naor
214 views
Provable Unlinkability Against Traffic Analysis
38 views
Multiparty Computation Ivan Damgård BRICS, Århus University
33 views
Security APIs for Mobile Devices
51 views
Cryptography CS 555
21 views
Secure Computation of the k’th Ranked Element
22 views
< Prev
Next >