Jakob Pagter
Jakob Pagter
Sepior ApS
Verified email at sepior.com - Homepage
Title
Cited by
Cited by
Year
Secure multiparty computation goes live
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
International Conference on Financial Cryptography and Data Security, 325-343, 2009
5182009
A practical implementation of secure auctions based on multiparty integer computation
P Bogetoft, I Damgård, T Jakobsen, K Nielsen, J Pagter, T Toft
International Conference on Financial Cryptography and Data Security, 142-147, 2006
1322006
From keys to databases—real-world applications of secure multi-party computation
DW Archer, D Bogdanov, Y Lindell, L Kamm, K Nielsen, JI Pagter, ...
The Computer Journal 61 (12), 1749-1771, 2018
682018
Optimal time-space trade-offs for sorting
J Pagter, T Rauhe
Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat …, 1998
571998
Multiparty Computation Goes Live.
P Bogetoft, DL Christensen, I Damgård, M Geisler, TP Jakobsen, ...
IACR Cryptol. ePrint Arch. 2008, 68, 2008
482008
Secure key management in the cloud
I Damgård, TP Jakobsen, JB Nielsen, JI Pagter
IMA International Conference on Cryptography and Coding, 270-289, 2013
322013
Location privacy via actively secure private proximity testing
JD Nielsen, JI Pagter, MB Stausholm
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
322012
Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications
P Bogetoft, IB Damgård, T Jakobsen, K Nielsen, J Pagter, T Toft
BRICS Report Series 12 (18), 2005
202005
Financial cryptography and data security
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Berlin, Heidelberg: Springer-Verlag, 325-343, 2009
152009
Secure multiparty computation goes live
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Cryptology EPrint Archive, Report 2008/068, 2008
132008
A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?
JI Pagter, MG Petersen
International Conference on Financial Cryptography and Data Security, 383-388, 2007
112007
Fast Threshold ECDSA with Honest Majority.
I Damgård, TP Jakobsen, JB Nielsen, JI Pagter, MB Østergård
IACR Cryptol. ePrint Arch. 2020, 501, 2020
82020
The All-or-Nothing Anti-Theft Policy--Theft Protection for Pervasive Computing
JI Pagter, MO Pedersen
21st International Conference on Advanced Information Networking and …, 2007
72007
Time-Space Trade-Offs
JI Pagter
University of Aarhus, 2001
72001
Using compilers to enhance cryptographic product development
E Bangerter, M Barbosa, D Bernstein, I Damgård, D Page, JI Pagter, ...
ISSE 2009 Securing Electronic Business Processes, 291-301, 2010
62010
Financial cryptography and data security
GD Crescenzo, AD Rubin, B Parno, C Kuo, A Perrig
10th International Conference, FC, 252, 2006
62006
System and a method for management of confidential data
IB Damgård, TP Jakobsen, JI Pagter
US Patent 10,354,084, 2019
52019
Future directions in computing on encrypted data
NP Smart, D Archer, D Bogdanov, S Boldyreva, S Ka-mara, FK SAP, ...
ECRYPT report, 2015
52015
Pervasive scenario evaluations: A multiperspective approach for evaluating emerging pervasive computing technologies
KM Hansen, SB Larsen, JI Pagter, M Østergaard Pedersen, J Thomsen
Technical report, ISIS Katrinebjerg. http://www. ooss. net/epcir, 2003
42003
Optimal time-space trade-offs for non-comparison-based sorting
R Pagh, J Pagter
BRICS Report Series, 2001
42001
The system can't perform the operation now. Try again later.
Articles 1–20