Sciweavers

1005 search results - page 62 / 201
» Practical Secure Function Evaluation
Sort
View
JWSR
2008
241views more  JWSR 2008»
13 years 8 months ago
A Model-Driven Development Framework for Non-Functional Aspects in Service Oriented Architecture
: Service Oriented Architecture (SOA) is an emerging style of software architectures to reuse and integrate existing systems for designing new applications. Each application is des...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
MSWIM
2009
ACM
14 years 3 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...
CCS
2008
ACM
13 years 11 months ago
FairplayMP: a system for secure multi-party computation
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the great achievements of modern cryptograp...
Assaf Ben-David, Noam Nisan, Benny Pinkas
PODS
2008
ACM
123views Database» more  PODS 2008»
14 years 9 months ago
Evaluating rank joins with optimal cost
In the rank join problem, we are given a set of relations and a scoring function, and the goal is to return the join results with the top K scores. It is often the case in practic...
Karl Schnaitter, Neoklis Polyzotis
CCS
2007
ACM
14 years 3 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu