Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Stateless Parties"'
Autor:
Gentry, Craig, Halevi, Shai, Krawczyk, Hugo, Magri, Bernardo, Nielsen, Jesper Buus, Rabin, Tal, Yakoubov, Sophia
Publikováno v:
Gentry, C, Halevi, S, Krawczyk, H, Magri, B, Nielsen, J B, Rabin, T & Yakoubov, S 2021, YOSO: You Only Speak Once : Secure MPC with Stateless Ephemeral Roles . in T Malkin & C Peikert (eds), Advances in Cryptology – CRYPTO 2021 : Annual International Cryptology Conference . Springer, Lecture Notes in Computer Science, vol. 12826, pp. 64-93, 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual, Online, 16/08/2021 . https://doi.org/10.1007/978-3-030-84245-1_3
The inherent difficulty of maintaining stateful environments over long periods of time gave rise to the paradigm of serverless computing, where mostly stateless components are deployed on demand to handle computation tasks, and are torn down once the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::a2918df10d08aab99f05c17c2414f3f1
https://pure.au.dk/portal/da/publications/yoso-you-only-speak-once(969a631b-46e1-4453-aedd-b356199e20bf).html
https://pure.au.dk/portal/da/publications/yoso-you-only-speak-once(969a631b-46e1-4453-aedd-b356199e20bf).html
Autor:
Eliot, Lewis B. H.
Publikováno v:
Atlantic Studies; Dec2019, Vol. 16 Issue 4, p482-501, 20p
Autor:
Craig Gentry, Tal Rabin, Hugo Krawczyk, Sophia Yakoubov, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen
Publikováno v:
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842444
CRYPTO (2)
CRYPTO (2)
The inherent difficulty of maintaining stateful environments over long periods of time gave rise to the paradigm of serverless computing, where mostly stateless components are deployed on demand to handle computation tasks, and are torn down once the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4c430f2ed4f67de48fb90e8811248ba3
https://doi.org/10.1007/978-3-030-84245-1_3
https://doi.org/10.1007/978-3-030-84245-1_3
Autor:
Guy Rothblum, Hoeteck Wee
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the
Autor:
Kobbi Nissim, Brent Waters
The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presente
Autor:
Tal Malkin, Chris Peikert
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the C
Autor:
Bridey Heing
When considering the damage caused by the hard power of military intervention, soft power comes across as an appealing alternative. Soft power depends on diplomatically appealing to others to gain favor and influence rather than using coercive force,
This book gathers selected papers presented at the Inventive Communication and Computational Technologies conference (ICICCT 2019), held on 29–30 April 2019 at Gnanamani College of Technology, Tamil Nadu, India. The respective contributions highlig
Autor:
Amos Beimel, Stefan Dziembowski
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the