Sciweavers

1286 search results - page 29 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
126
Voted
PDP
1997
IEEE
15 years 6 months ago
Language and library support for practical PRAM programming
We investigate the well-known PRAM model of parallel computation as a practical parallel programming model. The two components of this project are a general-purpose PRAM programmin...
Christoph W. Keßler, Jesper Larsson Trä...
129
Voted
ICDCS
2002
IEEE
15 years 7 months ago
A Fully Distributed Framework for Cost-Sensitive Data Mining
Data mining systems aim to discover patterns and extract useful information from facts recorded in databases. A widely adopted approach is to apply machine learning algorithms to ...
Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. S...
137
Voted
EUROCRYPT
2008
Springer
15 years 4 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
120
Voted
JNW
2008
99views more  JNW 2008»
15 years 2 months ago
Probabilistic Key Management Practical Concerns in Wireless Sensor Networks
The subject of Key Management in Wireless Sensor Networks has gained increased attention from the security community around the world in the last years. Several proposals were made...
Rui Miguel Soares Silva, Nuno Sidónio A. Pe...
142
Voted
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 8 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya