Sciweavers

5476 search results - page 24 / 1096
» Resettably Secure Computation
Sort
View
131
Voted
JCS
2010
121views more  JCS 2010»
15 years 1 months ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh
INFOCOM
2012
IEEE
13 years 6 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
TGC
2010
Springer
15 years 1 months ago
Probabilistic Aspects: Checking Security in an Imperfect World
Chris Hankin, Flemming Nielson, Hanne Riis Nielson
118
Voted
CSUR
2011
14 years 10 months ago
A survey of DHT security techniques
Guido Urdaneta, Guillaume Pierre, Maarten van Stee...
151
Voted
TDSC
2011
14 years 10 months ago
Securing Topology Maintenance Protocols for Sensor Networks
Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia,...