Sciweavers

5665 search results - page 173 / 1133
» Introduction to Computer Security
Sort
View
EUROCRYPT
2006
Springer
14 years 25 days ago
Efficient Binary Conversion for Paillier Encrypted Values
We consider the framework of secure n-party computation based on threshold homomorphic cryptosystems as put forth by Cramer,
Berry Schoenmakers, Pim Tuyls
MOBIHOC
2001
ACM
14 years 8 months ago
Secure pebblenets
Stefano Basagni, Kris Herrin, Danilo Bruschi, Emil...
EWSN
2007
Springer
14 years 8 months ago
Secure Data Aggregation with Multiple Encryption
Melek Önen, Refik Molva
NSDI
2008
13 years 11 months ago
Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model
In this paper, we discuss Bitfrost, the security model developed by the One Laptop Per Child project for its XO laptop computers. Bitfrost implements a number of security measures...
Meredith L. Patterson, Len Sassaman, David Chaum
JERIC
2006
68views more  JERIC 2006»
13 years 9 months ago
Teaching context in information security
: This paper discusses teaching the application of technical idea through non-technical discussions, especially the use of puzzles to engage students. After discussing the need for...
Matt Bishop