Sciweavers

621 search results - page 37 / 125
» Efficient Secure Multi-party Computation
Sort
View
SEC
2001
14 years 10 days ago
Communication-Efficient Group Key Agreement
Abstract Traditionally, research in secure group key agreement focuses on minimizing the computational overhead for cryptographic operations, and minimizing the communication overh...
Yongdae Kim, Adrian Perrig, Gene Tsudik
ICCV
2009
IEEE
15 years 4 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
CCS
2010
ACM
13 years 11 months ago
Secure latency estimation with treeple
A network latency estimation scheme associates a "position" to every peer in a distributed network such that the latency between any two nodes can be accurately estimate...
Eric Chan-Tin, Nicholas Hopper
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 11 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu
DAGSTUHL
2001
14 years 11 days ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...