Sciweavers

5484 search results - page 112 / 1097
» Almost-Everywhere Secure Computation
Sort
View
SASN
2004
ACM
15 years 9 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner
MIDDLEWARE
2004
Springer
15 years 9 months ago
GridBox: securing hosts from malicious and greedy applications
Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Evgueni Dodonov, Joelle Quaini Sousa, Hélio...
ASIACRYPT
1999
Springer
15 years 8 months ago
Approximation Hardness and Secure Communication in Broadcast Channels
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yvo Desmedt, Yongge Wang
112
Voted
GI
2007
Springer
15 years 7 months ago
Agent-Based Container Security Systems: An Interdisciplinary Perspective
: Container security systems including electronic seals play an important role in securing container logistics. Nevertheless, a lack of standards prevents devices by different vend...
Sven Werner, Arne Schuldt, Kateryna Daschkovska
EUROCRYPT
2011
Springer
14 years 7 months ago
Concurrent Composition in the Bounded Quantum Storage Model
We define the BQS-UC model, a variant of the UC model, that deals with protocols in the bounded quantum storage model. We present a statistically secure commitment protocol in th...
Dominique Unruh