Sciweavers

164 search results - page 20 / 33
» Covert two-party computation
Sort
View
CCS
2000
ACM
14 years 1 months ago
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
The Internet provides an environment where two parties, who are virtually strangers to each other, can make connections and do business together. Before any actual business starts...
Ting Yu, Xiaosong Ma, Marianne Winslett
CONCUR
2001
Springer
14 years 2 months ago
Probabilistic Information Flow in a Process Algebra
We present a process algebraic approach for extending to the probabilistic setting the classical logical information flow analysis of computer systems. In particular, we employ a ...
Alessandro Aldini
NSDI
2008
14 years 4 days ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
IH
1998
Springer
14 years 2 months ago
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control th...
Markus G. Kuhn, Ross J. Anderson
NIPS
1996
13 years 11 months ago
Analog VLSI Circuits for Attention-Based, Visual Tracking
A one-dimensional, visual tracking chip has been implemented using neuromorphic,analog VLSI techniques to modelselective visual attention in the control of saccadic and smooth pur...
Timothy K. Horiuchi, Tonia G. Morris, Christof Koc...