The SCEAS System
Navigation Menu

Search the dblp DataBase


Donald Beaver: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Donald Beaver
    Factoring: The DNA Solution. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:419-423 [Conf]
  2. Donald Beaver
    Adaptively Secure Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:300-314 [Conf]
  3. Donald Beaver
    One-Time Tables for Two-Party Computation. [Citation Graph (0, 0)][DBLP]
    COCOON, 1998, pp:361-370 [Conf]
  4. Donald Beaver
    Precomputing Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:97-109 [Conf]
  5. Donald Beaver
    Plug and Play Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:75-89 [Conf]
  6. Donald Beaver
    Multiparty Protocols Tolerating Half Faulty Processors. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:560-572 [Conf]
  7. Donald Beaver
    Foundations of Secure Interactive Computing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:377-391 [Conf]
  8. Donald Beaver
    Efficient Multiparty Protocols Using Circuit Randomization. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:420-432 [Conf]
  9. Donald Beaver, Joan Feigenbaum, Joe Kilian, Phillip Rogaway
    Security with Low Communication Overhead. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:62-76 [Conf]
  10. Donald Beaver, Joan Feigenbaum, Victor Shoup
    Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:326-338 [Conf]
  11. Donald Beaver, Shafi Goldwasser
    Multiparty Computation with Faulty Majority. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:589-590 [Conf]
  12. Donald Beaver
    Minimal-Latency Secure Function Evaluation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:335-350 [Conf]
  13. Donald Beaver
    On Deniability in Quantum Key Exchange. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:352-367 [Conf]
  14. Donald Beaver
    How to Break a "Secure" Oblivious Transfer Protocol. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:285-296 [Conf]
  15. Donald Beaver
    Equivocable Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:119-130 [Conf]
  16. Donald Beaver, Stuart Haber
    Cryptographic Protocols Provably Secure Against Dynamic Adversaries. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:307-323 [Conf]
  17. Donald Beaver, Nicol So
    Global, Unpredictable Bit Generation Without Broadcast. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:424-434 [Conf]
  18. Donald Beaver, Avishai Wool
    Quorum-Based Secure Multi-party Computation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:375-390 [Conf]
  19. Donald Beaver, Shafi Goldwasser
    Multiparty Computation with Faulty Majority (Extended Announcement) [Citation Graph (0, 0)][DBLP]
    FOCS, 1989, pp:468-473 [Conf]
  20. Donald Beaver
    Server-Assisted Cryptography. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:92-106 [Conf]
  21. Judit Bar-Ilan, Donald Beaver
    Non-Cryptographic Fault-Tolerant Computing in Constant Number of Rounds of Interaction. [Citation Graph (0, 0)][DBLP]
    PODC, 1989, pp:201-209 [Conf]
  22. Donald Beaver
    Network Security and Storage Security: Symmetries and Symmetry-Breaking. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:3-9 [Conf]
  23. Donald Beaver, Joan Feigenbaum
    Hiding Instances in Multioracle Queries. [Citation Graph (0, 0)][DBLP]
    STACS, 1990, pp:37-48 [Conf]
  24. Donald Beaver
    Correlated Pseudorandomness and the Complexity of Private Computations. [Citation Graph (0, 0)][DBLP]
    STOC, 1996, pp:479-488 [Conf]
  25. Donald Beaver
    Adaptive Zero Knowledge and Computational Equivocation (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    STOC, 1996, pp:629-638 [Conf]
  26. Donald Beaver
    Commodity-Based Cryptography (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    STOC, 1997, pp:446-455 [Conf]
  27. Donald Beaver, Silvio Micali, Phillip Rogaway
    The Round Complexity of Secure Protocols (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    STOC, 1990, pp:503-513 [Conf]
  28. Donald Beaver
    Computing with DNA. [Citation Graph (0, 0)][DBLP]
    Journal of Computational Biology, 1995, v:2, n:1, pp:1-7 [Journal]
  29. Donald Beaver
    Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1991, v:4, n:2, pp:75-122 [Journal]
  30. Donald Beaver, Joan Feigenbaum, Joe Kilian, Phillip Rogaway
    Locally Random Reductions: Improvements and Applications. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1997, v:10, n:1, pp:17-36 [Journal]

Search in 0.003secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002