Sciweavers

5484 search results - page 11 / 1097
» Almost-Everywhere Secure Computation
Sort
View
SP
2008
IEEE
118views Security Privacy» more  SP 2008»
13 years 10 months ago
Cheaper adjoints by reversing address computations
Laurent Hascoët, Jean Utke, Uwe Naumann
IEEESP
2011
13 years 2 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
GCC
2003
Springer
14 years 4 months ago
Research on Security Architecture and Protocols of Grid Computing System
This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstra...
Xiangming Fang, Shoubao Yang, Leitao Guo, Lei Zhan...
IACR
2011
196views more  IACR 2011»
12 years 10 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs