Keywords
DelegateDelegationLaptopComputer scienceKey (lock)Computer securityCryptographyProgramming languageOperating systemLawPolitical science
Affiliated Institutions
Related Publications
A new public key cryptosystem based on higher residues
Article Free Access Share on A new public key cryptosystem based on higher residues Authors: David Naccache Gemplus Card International, 34 rue Guynemer, Issy-les-Mouhneau CEDEX,...
Security under key-dependent inputs
Кваліфікаційна робота присвячена питанню по дослідженню безпеки операційних систем. \nМета роботи полягає у вивченні та використанні сучасних технологій у забезпечені інфор...
A Survey on Homomorphic Encryption Schemes
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns....
Publication Info
- Year
- 1998
- Type
- book-chapter
- Pages
- 153-168
- Citations
- 41
- Access
- Closed
External Links
Social Impact
Altmetric
PlumX Metrics
Social media, news, blog, policy document mentions
Citation Metrics
41
OpenAlex
Cite This
Oded Goldreich,
Birgit Pfitzmann,
Ronald L. Rivest
(1998).
Self-delegation with controlled propagation — or — What if you lose your laptop.
Lecture notes in computer science
, 153-168.
https://doi.org/10.1007/bfb0055726
Identifiers
- DOI
- 10.1007/bfb0055726