Sciweavers

5484 search results - page 64 / 1097
» Almost-Everywhere Secure Computation
Sort
View
132
Voted
FOCS
2006
IEEE
15 years 9 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...
286
Voted
POPL
2001
ACM
16 years 3 months ago
Programming language methods in computer security
traction
John C. Mitchell
138
Voted
ICICS
2009
Springer
15 years 10 months ago
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng...
ADAEUROPE
2006
Springer
15 years 9 months ago
Secure Execution of Computations in Untrusted Hosts
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...