Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of so...
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...