Search results

  • Springer Berlin Heidelberg, pp. 456–466, doi:10.1007/11496137_31, ISBN 978-3-540-26223-7 Yao, A. C. (1982). "Protocols for secure computations". 23rd Annual...
    9 KB (1,094 words) - 14:14, 27 March 2024
  • Computer Science. Vol. 3531. pp. 91–103. doi:10.1007/11496137_7. ISBN 978-3-540-26223-7. Rabkin, Ariel (2008). "Personal knowledge questions for fallback authentication:...
    14 KB (1,710 words) - 06:35, 25 February 2024
  • Vol. 3531. New York, NY. pp. 91–103. doi:10.1007/11496137_7. ISBN 978-3-540-26223-7. Retrieved 2013-04-02. M. Gandhi; M. Jakobsson & J. Ratkiewicz (2006)...
    13 KB (1,225 words) - 06:17, 14 May 2024
  • Thumbnail for Virgil Griffith
    with Texas: Deriving Mother's Maiden Names Using Public Records. ISBN 3-540-26223-7. Virgil Griffith, Larry S. Yaeger, 2005, MIT Press. Ideal Free Distribution...
    23 KB (2,074 words) - 18:46, 4 March 2024
  •  456–466. CiteSeerX 10.1.1.75.4917. doi:10.1007/11496137_31. ISBN 978-3-540-26223-7. Ioannidis, I.; Grama, A. (2003). "An efficient protocol for Yao's millionaires'...
    10 KB (1,950 words) - 03:20, 22 January 2024
  • Computer Science. Vol. 3531. pp. 64–175. doi:10.1007/11496137_12. ISBN 978-3-540-26223-7. S2CID 6571152. Buchmann, Johannes; Dahmen, Erik; Hülsing, Andreas (2011)...
    53 KB (5,564 words) - 09:54, 22 May 2024
  • Thumbnail for Group testing
     206–221. CiteSeerX 10.1.1.158.6036. doi:10.1007/11496137_15. ISBN 978-3-540-26223-7. Chlebus, B.S. (2001). "Randomized communication in radio networks"...
    69 KB (9,937 words) - 05:41, 19 February 2024