Sciweavers

5476 search results - page 79 / 1096
» Resettably Secure Computation
Sort
View
FOCS
2006
IEEE
15 years 9 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...
287
Voted
POPL
2001
ACM
16 years 4 months ago
Programming language methods in computer security
traction
John C. Mitchell
140
Voted
ICICS
2009
Springer
15 years 10 months ago
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng...
113
Voted
ADAEUROPE
2006
Springer
15 years 9 months ago
Secure Execution of Computations in Untrusted Hosts
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...