Sciweavers

264 search results - page 26 / 53
» Minimal-Latency Secure Function Evaluation
Sort
View
IMCS
2007
77views more  IMCS 2007»
13 years 9 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
EDBT
2008
ACM
147views Database» more  EDBT 2008»
14 years 10 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
RTCSA
2006
IEEE
14 years 3 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son
FOCS
2006
IEEE
14 years 3 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...
SASN
2005
ACM
14 years 3 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu