Sciweavers

1663 search results - page 79 / 333
» Computer Security in the Real World
Sort
View
SP
2002
IEEE
122views Security Privacy» more  SP 2002»
13 years 8 months ago
The UNICORE Grid infrastructure
UNICORE (Uniform Interface to Computer Resources) is a software infrastructure supporting seamless and secure access to distributed resources. UNICORE allows uniform access to dif...
Mathilde Romberg
AINA
2007
IEEE
14 years 3 months ago
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
Vandana Gunupudi, Stephen R. Tate
EUROPAR
2003
Springer
14 years 2 months ago
iClouds - Peer-to-Peer Information Sharing in Mobile Environments
The future mobile and ubiquitous computing world will need new forms of information sharing and collaboration between people. In this paper we present iClouds, an architecture for ...
Andreas Heinemann, Jussi Kangasharju, Fernando Lya...
AFRICACRYPT
2008
Springer
14 years 3 months ago
An Adaptation of the NICE Cryptosystem to Real Quadratic Orders
Abstract. In 2000, Paulus and Takagi introduced a public key cryptosystem called NICE that exploits the relationship between maximal and non-maximal orders in imaginary quadratic n...
Michael J. Jacobson Jr., Renate Scheidler, Daniel ...
ASIACRYPT
2007
Springer
14 years 27 days ago
Simple and Efficient Perfectly-Secure Asynchronous MPC
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversa...
Zuzana Beerliová-Trubíniová, ...