Sciweavers

2927 search results - page 38 / 586
» Secure Distributed Human Computation
Sort
View
HOTI
2005
IEEE
14 years 1 months ago
Internet Infrastructure Security
G. Manimaran, Basheer Al-Duwairi
GCC
2004
Springer
14 years 1 months ago
Security Architecture for Web Services
Yuan Rao, Boqin Feng, Jincang Han
ICICS
2009
Springer
14 years 2 months ago
GUC-Secure Join Operator in Distributed Relational Database
Privacy-preserving SQL computation in distributed relational database is one of important applications of secure multiparty computation. In contrast with comparatively more works o...
Yuan Tian, Hao Zhang
NDSS
2005
IEEE
14 years 1 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
EUROPKI
2004
Springer
14 years 1 months ago
Distributing Security-Mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Gabriel Vanrenen, Sean W. Smith