Sciweavers

2209 search results - page 89 / 442
» Language Based Secure Communication
Sort
View
ISI
2006
Springer
15 years 2 months ago
Measures to Detect Word Substitution in Intercepted Communication
Abstract. Those who want to conceal the content of their communications can do so by replacing words that might trigger attention by other words or locutions that seem more ordinar...
SzeWang Fong, David B. Skillicorn, Dmitri Roussino...
127
Voted
TDP
2010
166views more  TDP 2010»
14 years 9 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
ICALP
2001
Springer
15 years 7 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung
138
Voted
TOPLAS
2008
101views more  TOPLAS 2008»
15 years 2 months ago
Verifying policy-based web services security
WS-SecurityPolicy is a declarative language for configuring web services security mechanisms. We describe a formal semantics for WS-SecurityPolicy and propose a more abstract lang...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
TITB
2010
181views Education» more  TITB 2010»
14 years 9 months ago
PSKA: usable and secure key agreement scheme for body area networks
A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing inter-sensor communications within BANs is essen...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...