PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Strengthening integrality gaps for capacitated network design and covering problems
SODA '00 Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms
On securely scheduling a meeting
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations
MATA '00 Proceedings of the Second International Workshop on Mobile Agents for Telecommunication Applications
Committed Oblivious Transfer and Private Multi-Party Computation
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Introduction to Secure Computation
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
A Security Framework for Card-Based Systems
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Non-Interactive CryptoComputing For NC1
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
Fair secure two-party computation
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A round and communication efficient secure ranking protocol
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Partial fairness in secure two-party computation
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |