From post

On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do.

, и . Security Protocols Workshop, том 11286 из Lecture Notes in Computer Science, стр. 266-279. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Panel Session - Future Directions., , , , и . Security Protocols Workshop, том 1550 из Lecture Notes in Computer Science, стр. 227-239. Springer, (1998)On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do., и . Security Protocols Workshop, том 11286 из Lecture Notes in Computer Science, стр. 266-279. Springer, (2018)A Formal Framework for Evaluating Heuristic Programs., , и . Ann. Math. Artif. Intell., 22 (3-4): 193-206 (1998)Report on DIMACS seminar series.. SIGACT News, 21 (2): 25 (1990)An Approximate L1-Difference Algorithm for Massive Data Streams., , , и . SIAM J. Comput., 32 (1): 131-151 (2002)Probabilistically checkable debate systems and approximation algorithms for PSPACE-hard functions., , , и . STOC, стр. 305-314. ACM, (1993)Recognizing Composite Graphs is Equivalent to Testing Graph Isomorphism., и . SIAM J. Comput., 15 (2): 619-627 (1986)Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values., , , и . CoRR, (2015)Computation in a distributed information market., , , и . EC, стр. 156-165. ACM, (2003)Approximation and collusion in multicast cost sharing., , , , и . Games Econ. Behav., 47 (1): 36-71 (2004)