Sciweavers

5484 search results - page 13 / 1097
» Almost-Everywhere Secure Computation
Sort
View
CCS
2008
ACM
14 years 27 days ago
Secure control of portable images in a virtual computing utility
Ionut Constandache, Aydan R. Yumerefendi, Jeffrey ...
ISPEC
2009
Springer
14 years 5 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
IEEEARES
2007
IEEE
14 years 5 months ago
Self-Stabilization as a Foundation for Autonomic Computing
Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuve...
ESORICS
2007
Springer
14 years 5 months ago
Inductive Proofs of Computational Secrecy
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
CCS
2003
ACM
14 years 4 months ago
Automatic generation of two-party computations
Philip D. MacKenzie, Alina Oprea, Michael K. Reite...