Παρακολούθηση
Donald Beaver
Donald Beaver
Independent Scholar
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα post.harvard.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
The round complexity of secure protocols
D Beaver, S Micali, P Rogaway
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
10131990
Efficient multiparty protocols using circuit randomization
D Beaver
Advances in Cryptology—CRYPTO’91: Proceedings 11, 420-432, 1992
9931992
Dapper, a large-scale distributed systems tracing infrastructure
BH Sigelman, LA Barroso, M Burrows, P Stephenson, M Plakal, D Beaver, ...
7832010
Non-cryptographic fault-tolerant computing in constant number of rounds of interaction
J Bar-Ilan, D Beaver
Proceedings of the eighth annual ACM Symposium on Principles of distributed …, 1989
4061989
Foundations of secure interactive computing
D Beaver
Annual International Cryptology Conference, 377-391, 1991
3811991
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
D Beaver
Journal of Cryptology 4, 75-122, 1991
3151991
Hiding instances in multioracle queries
D Beaver, J Feigenbaum
Annual Symposium on Theoretical Aspects of Computer Science, 37-48, 1990
3101990
Precomputing oblivious transfer
D Beaver
Annual International Cryptology Conference, 97-109, 1995
3031995
Correlated pseudorandomness and the complexity of private computations
D Beaver
Proceedings of the twenty-eighth annual ACM symposium on Theory of computing …, 1996
2771996
Commodity-based cryptography
D Beaver
Proceedings of the twenty-ninth annual ACM symposium on Theory of computing …, 1997
1981997
Multiparty computation with faulty majority
D Beaver, S Goldwasser
Conference on the Theory and Application of Cryptology, 589-590, 1989
1921989
Cryptographic protocols provably secure against dynamic adversaries
D Beaver, S Haber
Workshop on the Theory and Application of of Cryptographic Techniques, 307-323, 1992
1691992
Security with low communication overhead
D Beaver, J Feigenbaum, J Kilian, P Rogaway
Advances in Cryptology-CRYPTO’90: Proceedings 10, 62-76, 1991
1261991
Multiparty protocols tolerating half faulty processors
D Beaver
Advances in Cryptology—CRYPTO’89 Proceedings 9, 560-572, 1990
1201990
A universal molecular computer
D Beaver
DIMACS Series in Discrete Mathematics and Theoretical Computer Science 27, 29-36, 1996
1151996
Perfect privacy for two-party protocols
D Beaver
Harvard University, Center for Research in Computing Technology, Aiken …, 1990
1021990
Locally random reductions: Improvements and applications
D Beaver, J Feigenbaum, J Kilian, P Rogaway
Journal of Cryptology 10, 17-36, 1997
911997
Computing with DNA
D Beaver
Journal of Computational Biology 2 (1), 1-7, 1995
861995
Minimal-latency secure function evaluation
D Beaver
International Conference on the Theory and Applications of Cryptographic …, 2000
732000
Plug and play encryption
D Beaver
Annual International Cryptology Conference, 75-89, 1997
731997
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20