Sciweavers

1005 search results - page 51 / 201
» Practical Secure Function Evaluation
Sort
View
NBIS
2009
Springer
14 years 1 months ago
A Security Framework for JXTA-Overlay
At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
CONTEXT
1999
Springer
14 years 1 months ago
Putting Similarity Assessments into Context: Matching Functions with the User's Intended Operations
This paper presents a practical application of context for the evaluation of semantic similarity. The work is based on a new model for the assessment of semantic similarity among ...
M. Andrea Rodríguez, Max J. Egenhofer
GLOBECOM
2008
IEEE
13 years 10 months ago
Evaluating P2PSIP under Attack: An Emulative Study
— Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIP-signaling is commonly referred to as P2PSIP ...
Jan Seedorf, Frank Ruwolt, Martin Stiemerling, Sav...
ATAL
2006
Springer
14 years 18 days ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski
IACR
2011
94views more  IACR 2011»
12 years 8 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...