Sciweavers

977 search results - page 101 / 196
» Secure Computation with Fixed-Point Numbers
Sort
View
CCS
2006
ACM
14 years 27 days ago
Scalable group communication system for scalable trust
Programmers of large-scale trusted systems need tools to simplify tasks such as replicating services or data. Group communication systems achieve this via various flavors of relia...
Krzysztof Ostrowski, Kenneth P. Birman
CRYPTO
2006
Springer
108views Cryptology» more  CRYPTO 2006»
14 years 25 days ago
Inverting HFE Is Quasipolynomial
In the last ten years, multivariate cryptography has emerged as a possible alternative to public key cryptosystems based on hard computational problems from number theory. Notably,...
Louis Granboulan, Antoine Joux, Jacques Stern
ACSAC
2001
IEEE
14 years 24 days ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
OOPSLA
1987
Springer
14 years 19 days ago
Self: The Power of Simplicity
SELF is an object-oriented language for exploratory programming based on a small number of simple and concrete ideas: prototypes, slots, and behavior. Prototypes combine inheritanc...
David Ungar, Randall B. Smith
IJISEC
2006
108views more  IJISEC 2006»
13 years 9 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt