Sciweavers

2139 search results - page 310 / 428
» Distributed computing and computer security education
Sort
View
ISI
2004
Springer
14 years 2 months ago
Privacy-Preserving Inter-database Operations
Abstract. We present protocols for distributed computation of relational intersections and equi-joins such that each site gains no information about the tuples at the other site th...
Gang Liang, Sudarshan S. Chawathe
FC
2001
Springer
125views Cryptology» more  FC 2001»
14 years 1 months ago
(M+1)st-Price Auction Protocol
Abstract. This paper presents a new protocol for M + 1st-price auction, a style of auction in which the highest M bidders win and pay a uniform price, determined by the (M + 1)st p...
Hiroaki Kikuchi
IJNSEC
2011
78views more  IJNSEC 2011»
13 years 4 months ago
Multi-authority Electronic Voting Scheme Based on Elliptic Curves
In this paper, a new multi authority electronic voting scheme based on elliptic curves is proposed. According to the proposed scheme, each voter casts the vote as a point on the e...
Chinniah Porkodi, Ramalingam Arumuganathan, Krishn...
COLCOM
2008
IEEE
14 years 3 months ago
Incentive and Trust Issues in Assured Information Sharing
Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different secur...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
AINA
2007
IEEE
14 years 3 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl