Sciweavers

5484 search results - page 76 / 1097
» Almost-Everywhere Secure Computation
Sort
View
90
Voted
COMPUTER
2007
78views more  COMPUTER 2007»
15 years 3 months ago
Discryption: Internal Hard-Disk Encryption for Secure Storage
Laszlo Hars
115
Voted
CIS
2006
Springer
15 years 7 months ago
Security Contexts in Autonomic Systems
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
Kaiyu Wan, Vasu S. Alagar
110
Voted
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
15 years 7 months ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig
155
Voted
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz
122
Voted
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
16 years 4 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...