Sciweavers

5665 search results - page 41 / 1133
» Introduction to Computer Security
Sort
View
SAT
2010
Springer
127views Hardware» more  SAT 2010»
13 years 6 months ago
Symmetry and Satisfiability: An Update
Abstract. The past few years have seen significant progress in algorithms and heuristics for both SAT and symmetry detection. Additionally, the thesis that some of SAT's intra...
Hadi Katebi, Karem A. Sakallah, Igor L. Markov
IEEEARES
2007
IEEE
14 years 3 months ago
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES)
The formidable difficulty in securing systems stems in large part from the increasing complexity of the systems we build but also the degree to which we now depend on information ...
David Arsenault, Arun Sood, Yih Huang
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 9 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
ICALP
2000
Springer
14 years 12 days ago
One-Round Secure Computation and Secure Autonomous Mobile Agents
d Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M
Christian Cachin, Jan Camenisch, Joe Kilian, Joy M...
STOC
2004
ACM
94views Algorithms» more  STOC 2004»
14 years 9 months ago
Completeness in two-party secure computation: a computational view
Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen