Sciweavers

686 search results - page 62 / 138
» Secure Two-Party Computation Is Practical
Sort
View
WINE
2005
Springer
179views Economy» more  WINE 2005»
14 years 3 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
CLEIEJ
2010
13 years 7 months ago
Design, Implementation and Use of a Remote Network Lab with Multiple Users Support as an Aid Teaching Computer Networks
This article presents the design, implementation and use of a remote network lab with multiple users support as an aid to teaching computer networks. The purpose is to enable mult...
Marco Aravena Vivar, Cristian Rodriguez, Andres Ra...
AFRICACRYPT
2010
Springer
14 years 4 months ago
Avoiding Full Extension Field Arithmetic in Pairing Computations
Abstract. The most costly operations encountered in pairing computations are those that take place in the full extension field Fpk . At high levels of security, the complexity of ...
Craig Costello, Colin Boyd, Juan Manuel Gonz&aacut...
NSPW
2003
ACM
14 years 3 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
CCS
2007
ACM
14 years 1 months ago
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...