Sciweavers

977 search results - page 101 / 196
» Secure Computation with Fixed-Point Numbers
Sort
View
117
Voted
CCS
2006
ACM
15 years 6 months ago
Scalable group communication system for scalable trust
Programmers of large-scale trusted systems need tools to simplify tasks such as replicating services or data. Group communication systems achieve this via various flavors of relia...
Krzysztof Ostrowski, Kenneth P. Birman
111
Voted
CRYPTO
2006
Springer
108views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
Inverting HFE Is Quasipolynomial
In the last ten years, multivariate cryptography has emerged as a possible alternative to public key cryptosystems based on hard computational problems from number theory. Notably,...
Louis Granboulan, Antoine Joux, Jacques Stern
113
Voted
ACSAC
2001
IEEE
15 years 6 months ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
108
Voted
OOPSLA
1987
Springer
15 years 6 months ago
Self: The Power of Simplicity
SELF is an object-oriented language for exploratory programming based on a small number of simple and concrete ideas: prototypes, slots, and behavior. Prototypes combine inheritanc...
David Ungar, Randall B. Smith
129
Voted
IJISEC
2006
108views more  IJISEC 2006»
15 years 2 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt