slides
Threshold and Proactive Pseudo-Random Permutations
Lesson 8: IPSec
Network security ece 702
Lecture 10 - Multi-Party Computation Protocols
Chap 12
Chap 4
Hacking
Network Security
Markus Jakobsson Bell Laboratories Ari Juels RSA Laboratories Mix and Match: A Simple Approach to General Secure Multiparty Computation +
Collaborating to Develop a Rural Electronic Health Record Tom Fritz Chief Executive Officer Inland Northwest Health Services.
Architectural issues for network-layer identifiers Stefan Savage Dept of Computer Science & Engineering UC San Diego.