Amanote Research

Amanote Research

    RegisterSign In

Secure Computation Without Authentication

Lecture Notes in Computer Science - Germany
doi 10.1007/11535218_22
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2005

Authors
Boaz BarakRan CanettiYehuda LindellRafael PassTal Rabin
Publisher

Springer Berlin Heidelberg


Related search

Message Authentication Based on Cryptographically Secure CRC Without Polynomial Irreducibility Test

Cryptography and Communications
Computational TheoryCommunicationsComputer NetworksApplied MathematicsMathematics
2017English

Secure Computation

English

Secure Virtualisation Using Hash Key Authentication

International Journal of Scientific Research in Computer Science, Engineering and Information Technology
2018English

Secure Authentication System Using Video Surveillance

IOSR Journal of Computer Engineering
2013English

Secure Authentication Protocol for Mobile Payment

Tsinghua Science and Technology
Multidisciplinary
2018English

Secure Barcode Authentication Using Genetic Algorithm

IOSR Journal of Computer Engineering
2014English

Secure In-Vehicle Systems Using Authentication

International Journal of Networked and Distributed Computing
Computer NetworksComputer Science ApplicationsCommunications
2015English

Efficient Non-Interactive Secure Computation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2011English

Secure Authentication Framework in Wireless Sensor Networks

International Journal of Computer Applications
2012English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy