Sciweavers

2673 search results - page 65 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
CCS
2006
ACM
13 years 11 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
NDSS
2005
IEEE
14 years 1 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
VIZSEC
2004
Springer
14 years 1 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
CONEXT
2008
ACM
13 years 9 months ago
Networking is IPC: a guiding principle to a better internet
This position paper outlines a new network architecture that is based on the fundamental principle that networking is interprocess communication (IPC). In this model, application ...
John Day, Ibrahim Matta, Karim Mattar
TNC
2004
146views Education» more  TNC 2004»
13 years 9 months ago
Connective Middleware for Voice and Integrated Communications
To engage Internet2 users in an exploration of peer-to-peer, real-time communications, these users require connectivity. Superior networking connectivity alone is not sufficient. ...
Ben Teitelbaum