Sciweavers

33 search results - page 5 / 7
» Secure Multi-party Computational Geometry
Sort
View
CCS
2009
ACM
14 years 10 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...
WADS
2001
Springer
105views Algorithms» more  WADS 2001»
14 years 2 months ago
Secure Multi-party Computational Geometry
Mikhail J. Atallah, Wenliang Du
CCS
2007
ACM
14 years 4 months ago
The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86)
sion of an extended abstract published in Proceedings of ACM CCS 2007, ACM Press, 2007. We present new techniques that allow a return-into-libc attack to be mounted on x86 executa...
Hovav Shacham
CORR
2007
Springer
74views Education» more  CORR 2007»
13 years 9 months ago
Secure Two-party Protocols for Point Inclusion Problem
It is well known that, in theory, the general secure multiparty computation problem is solvable using circuit evaluation protocols. However, the communication complexity of the re...
Tony Thomas