Sciweavers

2209 search results - page 20 / 442
» Language Based Secure Communication
Sort
View
TCC
2012
Springer
245views Cryptology» more  TCC 2012»
12 years 5 months ago
Secure Two-Party Computation with Low Communication
We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the ...
Ivan Damgård, Sebastian Faust, Carmit Hazay
IFIP
2005
Springer
14 years 3 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
EUROCRYPT
2007
Springer
14 years 3 months ago
Atomic Secure Multi-party Multiplication with Low Communication
We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
Ronald Cramer, Ivan Damgård, Robbert de Haan
CORR
2006
Springer
113views Education» more  CORR 2006»
13 years 9 months ago
Secure Positioning of Mobile Terminals with Simplex Radio Communication
With the rapid spread of various mobile terminals in our society, the importance of secure positioning is growing for wireless networks in adversarial settings. Recently, several ...
Mikio Fujii
CC
2005
Springer
14 years 3 months ago
A Compiler-Based Approach to Data Security
Feihui Li, Guilin Chen, Mahmut T. Kandemir, Richar...