Sciweavers

1005 search results - page 73 / 201
» Practical Secure Function Evaluation
Sort
View
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
14 years 9 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz
ESOP
2003
Springer
14 years 2 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 6 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
ISJ
2006
134views more  ISJ 2006»
13 years 9 months ago
Relative importance of evaluation criteria for enterprise systems: a conjoint study
Abstract. While a large body of research exists on the development and implementation of software, organizations are increasingly acquiring enterprise software packages [e.g. enter...
Mark Keil, Amrit Tiwana