Follow
Jakob Pagter
Jakob Pagter
Sepior ApS
Verified email at sepior.com - Homepage
Title
Cited by
Cited by
Year
Secure multiparty computation goes live
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
International Conference on Financial Cryptography and Data Security, 325-343, 2009
7532009
From keys to databases—real-world applications of secure multi-party computation
DW Archer, D Bogdanov, Y Lindell, L Kamm, K Nielsen, JI Pagter, ...
The Computer Journal 61 (12), 1749-1771, 2018
1742018
A practical implementation of secure auctions based on multiparty integer computation
P Bogetoft, I Damgård, T Jakobsen, K Nielsen, J Pagter, T Toft
Financial Cryptography and Data Security: 10th International Conference, FC …, 2006
1562006
Optimal time-space trade-offs for sorting
J Pagter, T Rauhe
Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat …, 1998
671998
Fast threshold ECDSA with honest majority
I Damgård, TP Jakobsen, JB Nielsen, JI Pagter, MB Østergaard
Journal of Computer Security 30 (1), 167-196, 2022
582022
Location privacy via actively secure private proximity testing
JD Nielsen, JI Pagter, MB Stausholm
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
472012
Secure key management in the cloud
I Damgård, TP Jakobsen, JB Nielsen, JI Pagter
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
462013
Multiparty computation goes live
P Bogetoft, DL Christensen, I Damgard, M Geisler, T Jakobsen, ...
Financial Cryptography and Data Security (FC), 2009
262009
Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications
P Bogetoft, IB Damgård, T Jakobsen, K Nielsen, J Pagter, T Toft
BRICS, Department of Computer Science, Univ., 2005
182005
Financial cryptography and data security
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Berlin, Heidelberg: Springer-Verlag, 325-343, 2009
172009
A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?
JI Pagter, MG Petersen
International Conference on Financial Cryptography and Data Security, 383-388, 2007
162007
System and a method for management of confidential data
IB Damgård, TP Jakobsen, JI Pagter
US Patent 10,354,084, 2019
102019
Secure multiparty computation goes live
P Bøgetoft, DL Christensen, IB Damgård, M Geisler, T Jacobsen, ...
Lecture Notes in Computer Science 5628, 325-343, 2009
82009
The All-or-Nothing Anti-Theft Policy--Theft Protection for Pervasive Computing
JI Pagter, MO Pedersen
21st International Conference on Advanced Information Networking and …, 2007
82007
Using compilers to enhance cryptographic product development
E Bangerter, M Barbosa, D Bernstein, I Damgård, D Page, JI Pagter, ...
ISSE 2009 Securing Electronic Business Processes: Highlights of the …, 2009
62009
Time-Space Trade-Offs
JI Pagter
University of Aarhus, 2001
62001
Future directions in computing on encrypted data
NP Smart, D Archer, D Bogdanov, S Boldyreva, S Ka-mara, ...
ECRYPT report, 2015
52015
Optimal time-space trade-offs for non-comparison-based sorting
R Pagh, J Pagter
BRICS Report Series, 2001
52001
Pervasive scenario evaluations: A multiperspective approach for evaluating emerging pervasive computing technologies
KM Hansen, SB Larsen, JI Pagter, M Østergaard Pedersen, J Thomsen
Technical report, ISIS Katrinebjerg. http://www. ooss. net/epcir, 2003
42003
I/O-space trade-offs
L Arge, J Pagter
Scandinavian Workshop on Algorithm Theory, 448-461, 2000
42000
The system can't perform the operation now. Try again later.
Articles 1–20