Sciweavers

718 search results - page 117 / 144
» Operational Semantics of Security Protocols
Sort
View
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
USENIX
2003
13 years 9 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
NOMS
1998
IEEE
133views Communications» more  NOMS 1998»
14 years 2 days ago
ATM customer network management using WWW and CORBA technologies
In this paper, we present a framework for managing ATM customer networks using WWW and CORBA technologies. The WWW technology may provide network management operators with platfor...
Jong-Wook Baek, Tae-Joon Ha, Jong-Tae Park, James ...
SDMW
2010
Springer
13 years 6 months ago
Joining Privately on Outsourced Data
In an outsourced database framework, clients place data management with specialized service providers. Of essential concern in such frameworks is data privacy. Potential clients ar...
Bogdan Carbunar, Radu Sion
ICWN
2004
13 years 9 months ago
Searching in Variably Connected P2P Networks
Peer-to-Peer networks are gaining popularity through file-sharing communities. Most P2P networks demand a certain stability from it's nodes in order to function satisfactory. ...
Njål T. Borch, Lars Kristian Vognild