Sciweavers

96 search results - page 14 / 20
» Covert Multi-Party Computation
Sort
View
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
13 years 11 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
CONCUR
2001
Springer
13 years 12 months ago
Probabilistic Information Flow in a Process Algebra
We present a process algebraic approach for extending to the probabilistic setting the classical logical information flow analysis of computer systems. In particular, we employ a ...
Alessandro Aldini
NSDI
2008
13 years 9 months ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
IH
1998
Springer
13 years 11 months ago
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control th...
Markus G. Kuhn, Ross J. Anderson
NIPS
1996
13 years 8 months ago
Analog VLSI Circuits for Attention-Based, Visual Tracking
A one-dimensional, visual tracking chip has been implemented using neuromorphic,analog VLSI techniques to modelselective visual attention in the control of saccadic and smooth pur...
Timothy K. Horiuchi, Tonia G. Morris, Christof Koc...