Sciweavers

1286 search results - page 27 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
132
Voted
ACSAC
2010
IEEE
15 years 21 days ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
124
Voted
ESORICS
2008
Springer
15 years 4 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
ISW
2004
Springer
15 years 8 months ago
Practical Authenticated Key Agreement Using Passwords
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
Taekyoung Kwon
91
Voted
EDOC
2004
IEEE
15 years 6 months ago
Using Subject-Oriented Modeling to Develop Jini Applications
A major contributing factor to the complexity of creating and evolving distributed systems is the tangling of middleware-specific functionality with core business functionality in...
Gagan Tandon, Sudipto Ghosh
141
Voted
EUROCRYPT
1998
Springer
15 years 6 months ago
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
Victor Shoup, Rosario Gennaro