Follow
Jakob Pagter
Jakob Pagter
Sepior ApS
Verified email at sepior.com - Homepage
Title
Cited by
Cited by
Year
Secure multiparty computation goes live
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
International Conference on Financial Cryptography and Data Security, 325-343, 2009
7892009
From keys to databases—real-world applications of secure multi-party computation
DW Archer, D Bogdanov, Y Lindell, L Kamm, K Nielsen, JI Pagter, ...
The Computer Journal 61 (12), 1749-1771, 2018
1882018
A practical implementation of secure auctions based on multiparty integer computation
P Bogetoft, I Damgård, T Jakobsen, K Nielsen, J Pagter, T Toft
Financial Cryptography and Data Security: 10th International Conference, FC …, 2006
1542006
Optimal time-space trade-offs for sorting
J Pagter, T Rauhe
Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat …, 1998
681998
Fast threshold ECDSA with honest majority
I Damgård, TP Jakobsen, JB Nielsen, JI Pagter, MB Østergaard
Journal of Computer Security 30 (1), 167-196, 2022
662022
Location privacy via actively secure private proximity testing
JD Nielsen, JI Pagter, MB Stausholm
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
482012
Secure key management in the cloud
I Damgård, TP Jakobsen, JB Nielsen, JI Pagter
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
442013
Financial cryptography and data security
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Berlin, Heidelberg: Springer-Verlag, 325-343, 2009
182009
Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications
P Bogetoft, IB Damgård, T Jakobsen, K Nielsen, J Pagter, T Toft
BRICS, Department of Computer Science, Univ., 2005
182005
A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?
JI Pagter, MG Petersen
International Conference on Financial Cryptography and Data Security, 383-388, 2007
172007
System and a method for management of confidential data
IB Damgård, TP Jakobsen, JI Pagter
US Patent 10,354,084, 2019
122019
Secure multiparty computation goes live
P Bøgetoft, DL Christensen, IB Damgård, M Geisler, T Jacobsen, ...
Lecture Notes in Computer Science 5628, 325-343, 2009
92009
The All-or-Nothing Anti-Theft Policy--Theft Protection for Pervasive Computing
JI Pagter, MO Pedersen
21st International Conference on Advanced Information Networking and …, 2007
82007
Using compilers to enhance cryptographic product development
E Bangerter, M Barbosa, D Bernstein, I Damgård, D Page, JI Pagter, ...
ISSE 2009 Securing Electronic Business Processes: Highlights of the …, 2009
62009
Time-Space Trade-Offs
JI Pagter
University of Aarhus, 2001
62001
Future directions in computing on encrypted data
NP Smart, D Archer, D Bogdanov, S Boldyreva, S Ka-mara, ...
ECRYPT report, 2015
52015
Optimal time-space trade-offs for non-comparison-based sorting
R Pagh, J Pagter
BRICS Report Series, 2001
52001
Pervasive scenario evaluations: A multiperspective approach for evaluating emerging pervasive computing technologies
KM Hansen, SB Larsen, JI Pagter, M Østergaard Pedersen, J Thomsen
Technical report, ISIS Katrinebjerg. http://www. ooss. net/epcir, 2003
42003
I/O-space trade-offs
L Arge, J Pagter
Scandinavian Workshop on Algorithm Theory, 448-461, 2000
42000
Digital signature generation using a cold wallet
JI Pagter, TP Jakobsen
US Patent App. 17/764,814, 2022
32022
The system can't perform the operation now. Try again later.
Articles 1–20