Sciweavers

24529 search results - page 45 / 4906
» Computing on Authenticated Data
Sort
View
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
14 years 3 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
IC
2000
13 years 11 months ago
Fault Tolerant Authentication in Mobile Computing
Bharat K. Bhargava, Sarat Babu Kamisetty, Sanjay K...
JITECH
2007
136views more  JITECH 2007»
13 years 9 months ago
A computer scientist's reactions to NPfIT
This paper contains a set of personal views relating to NHS Connecting for Health’s National Programme for IT (NPfIT), and in particular its Care Records Service, written from t...
Brian Randell
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
14 years 10 months ago
Authenticated join processing in outsourced databases
Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous aut...
Yin Yang, Dimitris Papadias, Stavros Papadopoulos,...