Sciweavers

325 search results - page 50 / 65
» Concurrent Composition of Secure Protocols in the Timing Mod...
Sort
View
WDAG
2009
Springer
146views Algorithms» more  WDAG 2009»
14 years 3 months ago
Dynamics in Network Interaction Games
We study the convergence times of dynamics in games involving graphical relationships of players. Our model of local interaction games generalizes a variety of recently studied ga...
Martin Hoefer, Siddharth Suri
AMW
2010
13 years 10 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
CCS
2011
ACM
12 years 8 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
ITIIS
2010
200views more  ITIIS 2010»
13 years 3 months ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee
NETWORK
2008
139views more  NETWORK 2008»
13 years 8 months ago
Composing semantic services in open sensor-rich environments
Consider a scenario where Jane is at an airport. She wants to find a restaurant with healthy food and short waiting time on the way to her terminal. The airport can provide such s...
Jie Liu, Feng Zhao