Sciweavers

352 search results - page 42 / 71
» Adaptively Secure Multi-Party Computation
Sort
View
JSS
2008
136views more  JSS 2008»
13 years 7 months ago
Specification, decomposition and agent synthesis for situation-aware service-based systems
Service-based systems are distributed computing systems with the major advantage of enabling rapid composition of distributed applications, such as collaborative research and deve...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
CODCRY
2009
Springer
111views Cryptology» more  CODCRY 2009»
14 years 2 months ago
On the Impossibility of Strong Encryption Over
We give two impossibility results regarding strong encryption over an infinite enumerable domain. The first one relates to statistically secure one-time encryption. The second on...
Raphael C.-W. Phan, Serge Vaudenay
TIT
2008
84views more  TIT 2008»
13 years 7 months ago
Information Theoretic Bounds on Authentication Systems in Query Model
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Reihaneh Safavi-Naini, Peter R. Wild
JLP
2007
86views more  JLP 2007»
13 years 7 months ago
Typing noninterference for reactive programs
We propose a type system to enforce the security property of noninterference in a core reactive language, obtained by extending the imperative language of Volpano, Smith and Irvin...
Ana Almeida Matos, Gérard Boudol, Ilaria Ca...
CSE
2009
IEEE
14 years 2 months ago
Designing Privacy for Scalable Electronic Healthcare Linkage
—A unified electronic health record (EHR) has potentially immeasurable benefits to society, and the current healthcare industry drive to create a single EHR reflects this. Howeve...
Anthony Stell, Richard O. Sinnott, Oluwafemi Ajayi...