Sciweavers

686 search results - page 56 / 138
» Secure Two-Party Computation Is Practical
Sort
View
CCS
2005
ACM
14 years 3 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
ICMCS
2006
IEEE
119views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Secured MPEG-21 Digital Item Adaptation for H.264 Video
Seamless adaptation and transcoding techniques to adapt the digital content have achieved significant focus to serve the consumers with the desired content in a feasible way. With...
Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb E...
FC
2003
Springer
133views Cryptology» more  FC 2003»
14 years 3 months ago
Secure Generalized Vickrey Auction Using Homomorphic Encryption
Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a com...
Koutarou Suzuki, Makoto Yokoo
OSDI
2006
ACM
14 years 10 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
PERCOM
2005
ACM
14 years 9 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong