Articoli di riviste sul tema "Oblivious transfer protocols"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Oblivious transfer protocols".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Sikora, Jamie. "On the existence of loss-tolerant quantum oblivious transfer protocols". Quantum Information and Computation 12, n. 7&8 (luglio 2012): 609–19. http://dx.doi.org/10.26421/qic12.7-8-6.
Testo completoNikov, Ventzislav, Svetla Nikova e Bart Preneel. "On Distributed Oblivious Transfer". Serdica Journal of Computing 1, n. 3 (26 settembre 2007): 313–36. http://dx.doi.org/10.55630/sjc.2007.1.313-336.
Testo completoCosta, Bruno, Pedro Branco, Manuel Goulão, Mariano Lemus e Paulo Mateus. "Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting". Entropy 23, n. 8 (31 luglio 2021): 1001. http://dx.doi.org/10.3390/e23081001.
Testo completoChailloux, Andre, Iordanis Kerenidis e Jamie Sikora. "Lower bounds for quantum oblivious transfer". Quantum Information and Computation 13, n. 1&2 (gennaio 2013): 158–77. http://dx.doi.org/10.26421/qic13.1-2-9.
Testo completoSong, Yaqi, e Li Yang. "Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer". Applied Sciences 8, n. 10 (19 ottobre 2018): 1990. http://dx.doi.org/10.3390/app8101990.
Testo completoDanoyan, D. H. "EXTENDING WHITE-BOX CRYPTOGRAPHY BASED OBLIVIOUS TRANSFER PROTOCOL". Proceedings of the YSU A: Physical and Mathematical Sciences 50, n. 1 (239) (18 marzo 2016): 40–44. http://dx.doi.org/10.46991/psyu:a/2016.50.1.040.
Testo completoKundu, Srijita, Jamie Sikora e Ernest Y. Z. Tan. "A device-independent protocol for XOR oblivious transfer". Quantum 6 (30 maggio 2022): 725. http://dx.doi.org/10.22331/q-2022-05-30-725.
Testo completoLi, Zengpeng, Can Xiang e Chengyu Wang. "Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography". Wireless Communications and Mobile Computing 2018 (2 settembre 2018): 1–11. http://dx.doi.org/10.1155/2018/5973285.
Testo completoSantos, Manuel B., Paulo Mateus e Armando N. Pinto. "Quantum Oblivious Transfer: A Short Review". Entropy 24, n. 7 (7 luglio 2022): 945. http://dx.doi.org/10.3390/e24070945.
Testo completoINOUE, Daisuke, e Keisuke TANAKA. "Symmetricity of the Protocols Related to Oblivious Transfer". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, n. 1 (2009): 217–21. http://dx.doi.org/10.1587/transfun.e92.a.217.
Testo completoDowsley, Rafael, Jörn Müller-Quade e Anderson C. A. Nascimento. "On the Composability of Statistically Secure Random Oblivious Transfer". Entropy 22, n. 1 (16 gennaio 2020): 107. http://dx.doi.org/10.3390/e22010107.
Testo completoSchaffner, C., B. Terhal e S. Wehner. "Robust cryptography in the noisy-quantum-storage model". Quantum Information and Computation 9, n. 11&12 (novembre 2009): 963–96. http://dx.doi.org/10.26421/qic9.11-12-4.
Testo completoTueno, Anselme, Florian Kerschbaum e Stefan Katzenbeisser. "Private Evaluation of Decision Trees using Sublinear Cost". Proceedings on Privacy Enhancing Technologies 2019, n. 1 (1 gennaio 2019): 266–86. http://dx.doi.org/10.2478/popets-2019-0015.
Testo completoZhao, Shengnan, Xiangfu Song, Han Jiang, Ming Ma, Zhihua Zheng e Qiuliang Xu. "An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications". Security and Communication Networks 2020 (5 dicembre 2020): 1–12. http://dx.doi.org/10.1155/2020/8847487.
Testo completoKiayias, Aggelos, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk e Qiang Tang. "Optimal Rate Private Information Retrieval from Homomorphic Encryption". Proceedings on Privacy Enhancing Technologies 2015, n. 2 (1 giugno 2015): 222–43. http://dx.doi.org/10.1515/popets-2015-0016.
Testo completoGancher, Joshua, Kristina Sojakova, Xiong Fan, Elaine Shi e Greg Morrisett. "A Core Calculus for Equational Proofs of Cryptographic Protocols". Proceedings of the ACM on Programming Languages 7, POPL (9 gennaio 2023): 866–92. http://dx.doi.org/10.1145/3571223.
Testo completoChou, Jue-Sam. "A Novelk-out-of-nOblivious Transfer Protocol from Bilinear Pairing". Advances in Multimedia 2012 (2012): 1–9. http://dx.doi.org/10.1155/2012/630610.
Testo completoSalvail, Louis, Christian Schaffner e Miroslava Sotáková. "Quantifying the leakage of quantum protocols for classical two-party cryptography". International Journal of Quantum Information 13, n. 04 (5 dicembre 2014): 1450041. http://dx.doi.org/10.1142/s0219749914500415.
Testo completoRührmair, Ulrich, e Marten van Dijk. "On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols". Journal of Cryptographic Engineering 3, n. 1 (26 marzo 2013): 17–28. http://dx.doi.org/10.1007/s13389-013-0052-8.
Testo completoSchmitt, Paul, Anne Edmundson, Allison Mankin e Nick Feamster. "Oblivious DNS: Practical Privacy for DNS Queries". Proceedings on Privacy Enhancing Technologies 2019, n. 2 (1 aprile 2019): 228–44. http://dx.doi.org/10.2478/popets-2019-0028.
Testo completoMohanty, Suneeta, Prasant Kumar Pattnaik e G. B. Mund. "Privacy Preserving Auction Based Virtual Machine Instances Allocation Scheme for Cloud Computing Environment". International Journal of Electrical and Computer Engineering (IJECE) 7, n. 5 (1 ottobre 2017): 2645. http://dx.doi.org/10.11591/ijece.v7i5.pp2645-2650.
Testo completoGutoski, Gus, Ansis Rosmanis e Jamie Sikora. "Fidelity of quantum strategies with applications to cryptography". Quantum 2 (3 settembre 2018): 89. http://dx.doi.org/10.22331/q-2018-09-03-89.
Testo completoWagh, Sameer. "Pika: Secure Computation using Function Secret Sharing over Rings". Proceedings on Privacy Enhancing Technologies 2022, n. 4 (ottobre 2022): 351–77. http://dx.doi.org/10.56553/popets-2022-0113.
Testo completoLi, Yang, Hongtao Song, Yunlong Zhao, Nianmin Yao e Nianbin Wang. "Anonymous Data Reporting Strategy with Dynamic Incentive Mechanism for Participatory Sensing". Security and Communication Networks 2021 (1 giugno 2021): 1–20. http://dx.doi.org/10.1155/2021/5518168.
Testo completoBraun, Lennart, Daniel Demmler, Thomas Schneider e Oleksandr Tkachenko. "MOTION – A Framework for Mixed-Protocol Multi-Party Computation". ACM Transactions on Privacy and Security 25, n. 2 (31 maggio 2022): 1–35. http://dx.doi.org/10.1145/3490390.
Testo completoYang, Songtao, e Qingfeng Jiang. "Towards Region Queries with Strong Location Privacy in Mobile Network". Mobile Information Systems 2021 (18 novembre 2021): 1–12. http://dx.doi.org/10.1155/2021/5972486.
Testo completoWagh, Sameer, Divya Gupta e Nishanth Chandran. "SecureNN: 3-Party Secure Computation for Neural Network Training". Proceedings on Privacy Enhancing Technologies 2019, n. 3 (1 luglio 2019): 26–49. http://dx.doi.org/10.2478/popets-2019-0035.
Testo completoLEE, N. Y. "Verifiable Oblivious Transfer Protocol". IEICE Transactions on Information and Systems E88-D, n. 12 (1 dicembre 2005): 2890–92. http://dx.doi.org/10.1093/ietisy/e88-d.12.2890.
Testo completoZheng, Yuan, Wang Mei e Feng Xiao. "Secure oblivious transfer protocol from indistinguishability obfuscation". Journal of China Universities of Posts and Telecommunications 23, n. 3 (giugno 2016): 1–10. http://dx.doi.org/10.1016/s1005-8885(16)60026-2.
Testo completoGenç, Ziya Alper, Vincenzo Iovino e Alfredo Rial. "“The simplest protocol for oblivious transfer” revisited". Information Processing Letters 161 (settembre 2020): 105975. http://dx.doi.org/10.1016/j.ipl.2020.105975.
Testo completoSong, Jiashuo, Dongfei Wang, Zhenzhen Zhang, Zhenzhen Li, Haiyang Ding e Zichen Li. "Universally Composable Oblivious Transfer with Low Communication". Applied Sciences 13, n. 4 (6 febbraio 2023): 2090. http://dx.doi.org/10.3390/app13042090.
Testo completoYu, Li, e Jun Yao Ye. "Analysis on A 1-out-n Security Protocol Based on Threshold Idea". Advanced Materials Research 605-607 (dicembre 2012): 2329–32. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2329.
Testo completoLemus, Mariano, Mariana F. Ramos, Preeti Yadav, Nuno A. Silva, Nelson J. Muga, André Souto, Nikola Paunković, Paulo Mateus e Armando N. Pinto. "Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation". Applied Sciences 10, n. 12 (12 giugno 2020): 4080. http://dx.doi.org/10.3390/app10124080.
Testo completoGuo, Xiao Qiang, Yan Yan, Hong Wang e Yi Shuo Shi. "Study on Quantum Oblivious Transfer". Applied Mechanics and Materials 263-266 (dicembre 2012): 3079–82. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3079.
Testo completoLi, Yan-Bing, Qiao-Yan Wen, Su-Juan Qin, Fen-Zhuo Guo e Ying Sun. "Practical quantum all-or-nothing oblivious transfer protocol". Quantum Information Processing 13, n. 1 (26 febbraio 2013): 131–39. http://dx.doi.org/10.1007/s11128-013-0550-8.
Testo completoJia, Xi, e Meng Zhang. "Encrypted Packet Inspection Based on Oblivious Transfer". Security and Communication Networks 2022 (24 agosto 2022): 1–13. http://dx.doi.org/10.1155/2022/4743078.
Testo completoYang, Penglin, Huizheng Geng, Li Su, Li Lu e Tingting Yang. "BSOT: Bandwidth-saving oblivious transfer protocol with confidential computing". Journal of Physics: Conference Series 2387, n. 1 (1 novembre 2022): 012008. http://dx.doi.org/10.1088/1742-6596/2387/1/012008.
Testo completoHe, Guang-Ping. "Coherent attacks on a practical quantum oblivious transfer protocol". Chinese Physics B 27, n. 10 (ottobre 2018): 100308. http://dx.doi.org/10.1088/1674-1056/27/10/100308.
Testo completoFischer, M. J., S. Micali e C. Rackoff. "A secure protocol for the oblivious transfer (extended abstract)". Journal of Cryptology 9, n. 3 (giugno 1996): 191–95. http://dx.doi.org/10.1007/bf00208002.
Testo completoSHINMYO, U., M. KURIBAYASHI, M. MORII e H. TANAKA. "Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, n. 10 (1 ottobre 2006): 2597–602. http://dx.doi.org/10.1093/ietfec/e89-a.10.2597.
Testo completoFischer, M. J., S. Micali e C. Rackoff. "A Secure Protocol for the Oblivious Transfer (Extended Abstract)". Journal of Cryptology 9, n. 3 (1996): 191. http://dx.doi.org/10.1007/s001459900011.
Testo completoDing, Hangchao, Han Jiang e Qiuliang Xu. "Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE". Security and Communication Networks 2021 (8 settembre 2021): 1–15. http://dx.doi.org/10.1155/2021/9974604.
Testo completoLiu, Mo-meng, Juliane Krämer, Yu-pu Hu e Johannes Buchmann. "Quantum security analysis of a lattice-based oblivious transfer protocol". Frontiers of Information Technology & Electronic Engineering 18, n. 9 (settembre 2017): 1348–69. http://dx.doi.org/10.1631/fitee.1700039.
Testo completoWang, Xiaotian, e Zichen Li. "Research on the security Oblivious Transfer protocol based on ECDDH". Journal of Physics: Conference Series 1549 (giugno 2020): 032152. http://dx.doi.org/10.1088/1742-6596/1549/3/032152.
Testo completoGuan, Albert, e Wen-Guey Tzeng. "A light-weight oblivious transfer protocol based on channel noise". International Journal of Computer Mathematics: Computer Systems Theory 2, n. 1 (2 gennaio 2017): 28–38. http://dx.doi.org/10.1080/23799927.2017.1323798.
Testo completoJain, Ashwin, e C. Hari. "A New Efficient Protocol for k-out-of-n Oblivious Transfer". Cryptologia 34, n. 4 (21 settembre 2010): 282–90. http://dx.doi.org/10.1080/01611194.2010.509284.
Testo completoMi, Bo, Darong Huang, Shaohua Wan, Yu Hu e Kim-Kwang Raymond Choo. "A post-quantum light weight 1-out-n oblivious transfer protocol". Computers & Electrical Engineering 75 (maggio 2019): 90–100. http://dx.doi.org/10.1016/j.compeleceng.2019.01.021.
Testo completoYajun Jiang, e Bo Yang. "A Privacy-preserving Digital Rights Management Protocol based on Oblivious Transfer Scheme". International Journal of Digital Content Technology and its Applications 5, n. 5 (31 maggio 2011): 337–41. http://dx.doi.org/10.4156/jdcta.vol5.issue5.37.
Testo completoRial, Alfredo, Josep Balasch e Bart Preneel. "A Privacy-Preserving Buyer–Seller Watermarking Protocol Based on Priced Oblivious Transfer". IEEE Transactions on Information Forensics and Security 6, n. 1 (marzo 2011): 202–12. http://dx.doi.org/10.1109/tifs.2010.2095844.
Testo completoWang, Qinglong, e Jintai Ding. "Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol". Cryptologia 38, n. 4 (30 agosto 2014): 370–76. http://dx.doi.org/10.1080/01611194.2014.915261.
Testo completo