Network-Hiding Communication and Applications to Multi-party Protocols (Q2829220): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_12 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2478434674 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Locality in Secure Multi-party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Hidden Graph Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost-everywhere secure computation with edge corruptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: The dining cryptographers problem: Unconditional sender and recipient untraceability / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast and unconditionally secure anonymous channel / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost-Everywhere Secure Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communications in unknown networks: preserving the secret of topology / rank
 
Normal rank
Property / cites work
 
Property / cites work: Network-Hiding Communication and Applications to Multi-party Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking the <i>O</i> ( <i>n</i> <sup>2</sup> ) bit barrier / rank
 
Normal rank
Property / cites work
 
Property / cites work: Scalable leader election / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topology-Hiding Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded-concurrent secure multi-party computation with a dishonest majority / rank
 
Normal rank

Latest revision as of 19:27, 12 July 2024

scientific article
Language Label Description Also known as
English
Network-Hiding Communication and Applications to Multi-party Protocols
scientific article

    Statements

    Network-Hiding Communication and Applications to Multi-party Protocols (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    27 October 2016
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references