Sciweavers

5476 search results - page 26 / 1096
» Resettably Secure Computation
Sort
View
129
Voted
WOWMOM
2005
ACM
99views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
Small Worlds and the Security of Ubiquitous Computing
This paper considers the small-world phenomenon in two contexts: ubiquitous computing and security. We argue that small-world properties emerge in ubicomp systems due to their nat...
Harald Vogt
120
Voted
SAC
2008
ACM
15 years 2 months ago
Web service security management using semantic web techniques
The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Securit...
Diego Zuquim Guimarães Garcia, Maria Beatri...
PERCOM
2010
ACM
15 years 1 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...
118
Voted
SEC
1993
15 years 4 months ago
Teaching Computer Security
This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.
Matt Bishop
143
Voted
SCN
2008
Springer
142views Communications» more  SCN 2008»
15 years 3 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart