Sciweavers

145 search results - page 14 / 29
» Secure Two-Party Computation with Low Communication
Sort
View
JSAC
2006
127views more  JSAC 2006»
13 years 8 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
ICICS
2004
Springer
14 years 2 months ago
Automatic Covert Channel Analysis of a Multilevel Secure Component
Abstract. The NRL Pump protocol defines a multilevel secure component whose goal is to minimize leaks of information from high level systems to lower level systems, without degrad...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone...
TCC
2007
Springer
170views Cryptology» more  TCC 2007»
14 years 2 months ago
Secure Linear Algebra Using Linearly Recurrent Sequences
In this work we present secure two-party protocols for various core problems in linear algebra. Our main result is a protocol to obliviously decide singularity of an encrypted matr...
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew...
INFOCOM
2010
IEEE
13 years 7 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
ADHOCNOW
2008
Springer
14 years 3 months ago
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person’s vital functions, is an enabler in providing better personal health care w...
Dave Singelée, Benoît Latré, B...