Sciweavers

1656 search results - page 145 / 332
» Secure Computation Without Authentication
Sort
View
EGC
2005
Springer
14 years 3 months ago
HotGrid: Graduated Access to Grid-Based Science Gateways
Abstract. We describe the idea of a Science Gateway, an applicationspeciļ¬c task wrapped as a web service, and some examples of these that are being implemented on the US TeraGrid...
Roy Williams, Conrad Steenberg, Julian J. Bunn
ASIACRYPT
2004
Springer
14 years 3 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
FAST
2003
13 years 11 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ļ¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
FSTTCS
2009
Springer
14 years 5 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for reļ¬nement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
SAC
2010
ACM
14 years 5 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of ļ¬ne-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...