Sciweavers

5476 search results - page 87 / 1096
» Resettably Secure Computation
Sort
View
ATAL
2011
Springer
14 years 3 months ago
Improved computational models of human behavior in security games
Rong Yang, Christopher Kiekintveld, Fernando Ord&o...
83
Voted
IACR
2011
89views more  IACR 2011»
14 years 3 months ago
Concurrently Secure Computation in Constant Rounds
Sanjam Garg, Vipul Goyal, Abhishek Jain 0002, Amit...
80
Voted
IACR
2011
89views more  IACR 2011»
14 years 3 months ago
Threshold Fully Homomorphic Encryption and Secure Computation
Steven Myers, Mona Sergi, Abhi Shelat
ANCS
2010
ACM
15 years 1 months ago
A traffic-aware top-N firewall ruleset approximation algorithm
Packet classification is widely used in various network security and operation applications. Two of the main challenges are the increasing number of classification rules, amount o...
Ho-Yu Lam, Donghan (Jarod) Wang, H. Jonathan Chao
EUROCRYPT
2008
Springer
15 years 5 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith