Sciweavers

562 search results - page 20 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
CHI
2010
ACM
15 years 10 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
16 years 4 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu
IACR
2011
128views more  IACR 2011»
14 years 3 months ago
Sign Modules in Secure Arithmetic Circuits
In this paper, we study the complexity of secure multiparty computation using only the secure arithmetic black-box of a finite field, counting the cost by the number of secure m...
Ching-Hua Yu
IANDC
2007
152views more  IANDC 2007»
15 years 3 months ago
The reactive simulatability (RSIM) framework for asynchronous systems
We define reactive simulatability for general asynchronous systems. Roughly, simulatability means that a real system implements an ideal system (specification) in a way that pre...
Michael Backes, Birgit Pfitzmann, Michael Waidner
AGENTS
2000
Springer
15 years 8 months ago
Agent communication transfer protocol
Conversations involving three or more agents often occur in multi-agent systems, for example in brokering and auction protocols typically used in e-commerce. For developing agents ...
Alexander Artikis, Jeremy Pitt, Christos Stergiou