How to Securely Outsource Cryptographic Computations

Cached

Download Links

by Susan Hohenberger , Anna Lysyanskaya
Venue:In Theory of Cryptography (2005
Citations:25 - 0 self