Sciweavers

2846 search results - page 134 / 570
» Not one click for security
Sort
View
123
Voted
UAI
2000
15 years 6 months ago
Compact Securities Markets for Pareto Optimal Reallocation of Risk
The securities market is the fundamental theoretical framework in economics and finance for resource allocation under uncertainty. Securities serve both to reallocate risk and to ...
David M. Pennock, Michael P. Wellman
CCS
2010
ACM
15 years 4 months ago
Secure latency estimation with treeple
A network latency estimation scheme associates a "position" to every peer in a distributed network such that the latency between any two nodes can be accurately estimate...
Eric Chan-Tin, Nicholas Hopper
CCS
2010
ACM
15 years 4 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
SP
2010
IEEE
181views Security Privacy» more  SP 2010»
15 years 2 months ago
SCiFI - A System for Secure Face Identification
Abstract--We introduce SCiFI, a system for Secure Computation of Face Identification. The system performs face identification which compares faces of subjects with a database of re...
Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Bo...
146
Voted
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
15 years 2 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...