Sciweavers

66 search results - page 3 / 14
» Secure Remote Execution of Sequential Computations
Sort
View
OOPSLA
2005
Springer
14 years 29 days ago
Lifting sequential graph algorithms for distributed-memory parallel computation
This paper describes the process used to extend the Boost Graph Library (BGL) for parallel operation with distributed memory. The BGL consists of a rich set of generic graph algor...
Douglas Gregor, Andrew Lumsdaine
SBACPAD
2004
IEEE
93views Hardware» more  SBACPAD 2004»
13 years 8 months ago
FlowCert : Probabilistic Certification for Peer-to-Peer Computations
Large scale cluster, Peer-to-Peer computing systems and grid computer systems gather thousands of nodes for computing parallel applications. At this scale, it raises the problem o...
Sébastien Varrette, Jean-Louis Roch, Franck...
CRYPTO
2000
Springer
110views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
Parallel Reducibility for Information-Theoretically Secure Computation
Secure Function Evaluation (SFE) protocols are very hard to design, and reducibility has been recognized as a highly desirable property of SFE protocols. Informally speaking, reduc...
Yevgeniy Dodis, Silvio Micali
TRUST
2010
Springer
14 years 16 days ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
SOCIALCOM
2010
13 years 2 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...