Jakob Pagter
Jakob Pagter
Sepior ApS
Verified email at sepior.com - Homepage
TitleCited byYear
Secure multiparty computation goes live
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
International Conference on Financial Cryptography and Data Security, 325-343, 2009
4192009
A practical implementation of secure auctions based on multiparty integer computation
P Bogetoft, I Damgård, T Jakobsen, K Nielsen, J Pagter, T Toft
International Conference on Financial Cryptography and Data Security, 142-147, 2006
1152006
Optimal time-space trade-offs for sorting
J Pagter, T Rauhe
Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat …, 1998
551998
Multiparty Computation Goes Live.
P Bogetoft, DL Christensen, I Damgård, M Geisler, TP Jakobsen, ...
IACR Cryptology ePrint Archive 2008, 68, 2008
462008
Location privacy via actively secure private proximity testing
JD Nielsen, JI Pagter, MB Stausholm
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
302012
From Keys to Databases—Real-World Applications of Secure Multi-Party Computation
DW Archer, D Bogdanov, Y Lindell, L Kamm, K Nielsen, JI Pagter, ...
The Computer Journal 61 (12), 1749-1771, 2018
282018
Secure key management in the cloud
I Damgård, TP Jakobsen, JB Nielsen, JI Pagter
IMA International Conference on Cryptography and Coding, 270-289, 2013
272013
Financial cryptography and data security
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Berlin, Heidelberg: Springer-Verlag, 325-343, 2009
192009
Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications
P Bogetoft, IB Damgård, T Jakobsen, K Nielsen, J Pagter, T Toft
BRICS Report Series 12 (18), 2005
182005
Secure multiparty computation goes live
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Cryptology EPrint Archive, Report 2008/068, 2008
132008
A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?
JI Pagter, MG Petersen
International Conference on Financial Cryptography and Data Security, 383-388, 2007
102007
The All-or-Nothing Anti-Theft Policy--Theft Protection for Pervasive Computing
JI Pagter, MO Pedersen
21st International Conference on Advanced Information Networking and …, 2007
72007
Time-Space Trade-Offs
JI Pagter
University of Aarhus, 2001
72001
Using compilers to enhance cryptographic product development
E Bangerter, M Barbosa, D Bernstein, I Damgård, D Page, JI Pagter, ...
ISSE 2009 Securing Electronic Business Processes, 291-301, 2010
62010
Financial Cryptography and Data Security
GD Crescenzo, AD Rubin, B Parno, C Kuo, A Perrig
10th International Conference, FC, 252, 2006
52006
System and a method for management of confidential data
IB Damgård, TP Jakobsen, JI Pagter
US Patent 10,354,084, 2019
42019
Future directions in computing on encrypted data
NP Smart, D Archer, D Bogdanov, S Boldyreva, S Ka-mara, FK SAP, ...
Tech. rep., 2015
42015
Pervasive scenario evaluations: A multiperspective approach for evaluating emerging pervasive computing technologies
KM Hansen, SB Larsen, JI Pagter, M Østergaard Pedersen, J Thomsen
Technical report, ISIS Katrinebjerg. http://www. ooss. net/epcir, 2003
42003
Optimal time-space trade-offs for non-comparison-based sorting
R Pagh, J Pagter
Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete …, 2002
32002
I/O-space trade-offs
L Arge, J Pagter
Scandinavian Workshop on Algorithm Theory, 448-461, 2000
32000
The system can't perform the operation now. Try again later.
Articles 1–20