Sciweavers

1656 search results - page 28 / 332
» Secure Computation Without Authentication
Sort
View
CN
2007
144views more  CN 2007»
13 years 9 months ago
SPP: An anti-phishing single password protocol
Most users have multiple accounts on the Internet where each account is protected by a password. To avoid the headache in remembering and managing a long list of different and un...
Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Moham...
CSREASAM
2009
13 years 7 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong
CN
1999
88views more  CN 1999»
13 years 9 months ago
Building a high-performance, programmable secure coprocessor
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Z .execute and accumulate state , free of observation and inte...
Sean W. Smith, Steve Weingart
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 4 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...
JIPS
2007
131views more  JIPS 2007»
13 years 9 months ago
A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations
: We propose several practical SMC protocols for privacy-preserving cooperative scientific computations. We consider two important scientific computations which involve linear equa...
Ju-Sung Kang, Dowon Hong