Ensuring the integrity of agent-based computations by short proofs
- 1 January 1998
- book chapter
- Published by Springer Nature
- p. 183-194
- https://doi.org/10.1007/bfb0057658
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Handbook of Applied CryptographyPublished by Taylor & Francis ,2018
- Replication is not needed: single database, computationally-private information retrievalPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Time Limited Blackbox Security: Protecting Mobile Agents From Malicious HostsPublished by Springer Nature ,1998
- Proof-carrying codePublished by Association for Computing Machinery (ACM) ,1997
- Extensibility safety and performance in the SPIN operating systemPublished by Association for Computing Machinery (ACM) ,1995
- Nearly-linear size holographic proofsPublished by Association for Computing Machinery (ACM) ,1994
- Proof verification and hardness of approximation problemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1992
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991
- On hiding information from an oracleJournal of Computer and System Sciences, 1989
- Non-interactive zero-knowledge and its applicationsPublished by Association for Computing Machinery (ACM) ,1988