Sciweavers

5484 search results - page 153 / 1097
» Almost-Everywhere Secure Computation
Sort
View
CIS
2004
Springer
15 years 9 months ago
A Scalable and Reliable Mobile Agent Computation Model
This paper presents a high performance service based mobile agent computation model. The scalability and reliability of this model is secured through the service clone policy and a...
Yong Liu, Congfu Xu, Zhaohui Wu, Yunhe Pan
CANS
2008
Springer
98views Cryptology» more  CANS 2008»
15 years 6 months ago
Counting Method for Multi-party Computation over Non-abelian Groups
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computation over nonAbelian groups. The function to be computed is fG(x1, . . . , x...
Youming Qiao, Christophe Tartary
FOCS
2010
IEEE
15 years 2 months ago
On the Computational Complexity of Coin Flipping
Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a coin flipping protocol should guarantee both (1) Completeness: an honest executi...
Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
JOC
2000
95views more  JOC 2000»
15 years 3 months ago
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Martin Hirt, Ueli M. Maurer
SOSP
2003
ACM
16 years 1 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...