Sciweavers

2270 search results - page 166 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
130
Voted
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 4 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
119
Voted
ASIACRYPT
2009
Springer
15 years 10 months ago
Group Encryption: Non-interactive Realization in the Standard Model
Group encryption (GE) schemes, introduced at Asiacrypt’07, are an encryption analogue of group signatures with a number of interesting applications. They allow a sender to encryp...
Julien Cathalo, Benoît Libert, Moti Yung
131
Voted
ISOLA
2010
Springer
15 years 2 months ago
Ten Years of Performance Evaluation for Concurrent Systems Using CADP
This article comprehensively surveys the work accomplished during the past decade on an approach to analyze concurrent systems qualitatively and quantitatively, by combining functi...
Nicolas Coste, Hubert Garavel, Holger Hermanns, Fr...
133
Voted
NAS
2010
IEEE
15 years 2 months ago
Inter-vehicular Communication Systems, Protocols and Middleware
— Inter-vehicular communication is an important research area that is rapidly growing due to considerable advances in mobile and wireless communication technologies, as well as t...
Imad Jawhar, Nader Mohamed, Liren Zhang
137
Voted
LISA
2004
15 years 5 months ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...