Sciweavers

164 search results - page 21 / 33
» Covert two-party computation
Sort
View
IPPS
2005
IEEE
14 years 3 months ago
GridIS: An Incentive-Based Grid Scheduling
In a grid computing environment, resources are autonomous, wide-area distributed, and what’s more, they are usually not free. These unique characteristics make scheduling in a s...
Lijuan Xiao, Yanmin Zhu, Lionel M. Ni, Zhiwei Xu
TCOS
2010
13 years 4 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
IPPS
2005
IEEE
14 years 3 months ago
ExchangeGuard: A Distributed Protocol for Electronic Fair-Exchange
1 Electronic fair-exchange protocols have received significant attention from the research community in the recent past. In loose terms, the fair exchange problem is defined as at...
Mudhakar Srivatsa, Li Xiong, Ling Liu
NDSS
2003
IEEE
14 years 3 months ago
Proxy Cryptography Revisited
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various proxy functions allow two cooperating parties F (the “FBI”) and P (the “pro...
Anca-Andreea Ivan, Yevgeniy Dodis
ICN
2001
Springer
14 years 2 months ago
Management and Realization of SLA for Providing Network QoS
We consider an SLA (Service Level Agreement) committed between two parties to use the guarantee of QoS provided by a QoS Enabled Network (QEN). QEN can provide guarantee of QoS bec...
Manzoor Hashmani, Mikio Yoshida, Takeshi Ikenaga, ...