Dissertations / Theses on the topic 'Oblivious transfer protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 17 dissertations / theses for your research on the topic 'Oblivious transfer protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Zhang, Jun Qi, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Oblivious transfer protocols for securing electronic commerce." THESIS_CSTE_CIT_Zhang_J.xml, 2002. http://handle.uws.edu.au:8081/1959.7/289.
Full textZhang, Jun Qi. "Oblivious transfer protocols for securing electronic commerce." Thesis, View thesis View thesis, 2002. http://handle.uws.edu.au:8081/1959.7/289.
Full textZhang, Jun Qi. "Oblivious transfer protocols for securing electronic commerce /." View thesis View thesis, 2002. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030417.113506/index.html.
Full textVega, Enrique Larraia de. "Universally composable protocols for multi-party computation and oblivious transfer." Thesis, University of Bristol, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.689689.
Full textChailloux, André. "Quantum coin flipping and bit commitment : optimal bounds, pratical constructions and computational security." Thesis, Paris 11, 2011. http://www.theses.fr/2011PA112121/document.
Full textJYUN-YI-LI and 李俊毅. "Oblivious Transfer Protocols Based on Elliptic Curve Cryptography." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/69881759803951037443.
Full textLin, Chi-Shin, and 林其新. "Design and Analysis of Efficient k-out-of-n Oblivious Transfer and Priced Oblivious Transfer Protocols." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/06460745449799663255.
Full textCorniaux, Christian L. F. "Exploratory designs of unconditionally secure distributed oblivious transfer protocols." Thesis, 2016. https://researchonline.jcu.edu.au/43771/1/43771-corniaux-2016-thesis.pdf.
Full textChang, Tyng-Kwei, and 張庭魁. "Researches of Quantum Key Distribution and Quantum Oblivious Transfer Protocols." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/88826602125242601048.
Full textLin, Chi-Hsuan, and 林季玄. "Reusable Oblivious Transfer Protocol." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/62876393658199007448.
Full textWu, Shiu-Dung, and 吳旭東. "The study of quantum oblivious transfer protocol." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/67511405636506891720.
Full textChen, Li-Ting, and 陳立庭. "Applying Cryptography to Password, GSM and Oblivious Transfer Protocol." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/vhn7kq.
Full textLui, Kun-Ji, and 呂昆璣. "Design of t out of n Weighted Oblivious Transfer Protocol." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/28379854813672605610.
Full textCanetti, Ran, Ling Cheung, Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier, and Roberto Segala. "Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol." 2005. http://hdl.handle.net/1721.1/30566.
Full textCiou, Shu-en, and 邱數恩. "A Revised Priced Oblivious Transfer Protocol for Privacy Preserving in E-commerce." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/58681344354473062764.
Full textSHEN, YI-TING, and 沈怡庭. "A Novel t-out-of-n Oblivious Transfer Protocol Based on Elliptic Curve Cryptography." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/9aser2.
Full textAjith, S. "Fast Actively Secure OT Extension for Short Secrets." Thesis, 2017. http://etd.iisc.ernet.in/2005/3623.
Full text