Sciweavers

2209 search results - page 77 / 442
» Language Based Secure Communication
Sort
View
116
Voted
CCS
2009
ACM
15 years 9 months ago
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms
We enforce information flow policies in programs that run at multiple locations, with diverse levels of security. We build a compiler from a small imperative language with locali...
Cédric Fournet, Gurvan Le Guernic, Tamara R...
103
Voted
CEC
2009
IEEE
15 years 9 months ago
Coevolution of language and intentionality sharing
—We conduct an evolutionary simulation to explore the coevolution of language and a language-related ability, intentionality sharing. Our simulation shows that during the evoluti...
Tao Gong, James W. Minett, William S.-Y. Wang
FC
2005
Springer
142views Cryptology» more  FC 2005»
15 years 8 months ago
Testing Disjointness of Private Datasets
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we ...
Aggelos Kiayias, Antonina Mitrofanova
128
Voted
ITNG
2007
IEEE
15 years 8 months ago
THIS: THreshold security for Information aggregation in Sensor networks
Message aggregation can be used to reduce the communication overhead in a network where many messages have the “same” content. However, it may make the network less secure bec...
Hai Vu, Neeraj Mittal, Subbarayan Venkatesan
139
Voted
GLOBECOM
2010
IEEE
15 years 15 days ago
Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-Hop Wireless Network
Abstract-Secure cooperation incentive schemes usually use public key cryptography, which incur too heavy overhead to be used efficiently in limited-resource nodes. In this paper, w...
Mohamed Elsalih Mahmoud, Xuemin Shen