Sciweavers

5476 search results - page 27 / 1096
» Resettably Secure Computation
Sort
View
ISI
2006
Springer
15 years 3 months ago
A Trust-Based Security Architecture for Ubiquitous Computing Systems
Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van...
221
Voted
HPCA
2011
IEEE
14 years 7 months ago
Architectural framework for supporting operating system survivability
The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attack...
Xiaowei Jiang, Yan Solihin
PROVSEC
2009
Springer
15 years 10 months ago
GUC-Secure Set-Intersection Computation
Secure set-intersection computation is one of important problems in secure multiparty computation with various applications. We propose a general construction for secure 2-party se...
Yuan Tian, Hao Zhang
108
Voted
CCS
2008
ACM
15 years 5 months ago
Computationally sound mechanized proofs for basic and public-key Kerberos
Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, J...
ISI
2006
Springer
15 years 3 months ago
A Flexible and Scalable Access Control for Ubiquitous Computing Environments
Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungy...