Sciweavers

224 search results - page 26 / 45
» Secrecy in Untrusted Networks
Sort
View
RTAS
2009
IEEE
14 years 1 months ago
Partial Program Admission
Abstract—Real-time systems on non-preemptive platforms require a means of bounding the execution time of programs for admission purposes. Worst-Case Execution Time (WCET) is most...
Michael Wilson, Ron Cytron, Jonathan S. Turner
SCAM
2007
IEEE
14 years 1 months ago
Barrier Slicing for Remote Software Trusting
Remote trusting aims at verifying the “healthy” execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giv...
Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, C...
WPES
2003
ACM
14 years 16 hour ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
PET
2010
Springer
13 years 10 months ago
Drac: An Architecture for Anonymous Low-Volume Communications
We present Drac, a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary. The...
George Danezis, Claudia Díaz, Carmela Tronc...
JVM
2004
118views Education» more  JVM 2004»
13 years 8 months ago
Java, Peer-to-Peer, and Accountability: Building Blocks for Distributed Cycle Sharing
The increased popularity of grid systems and cycle sharing across organizations leads to the need for scalable systems that provide facilities to locate resources, to be fair in t...
Ali Raza Butt, Xing Fang, Y. Charlie Hu, Samuel P....