Sciweavers

1449 search results - page 100 / 290
» Secure and Efficient Metering
Sort
View
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
14 years 4 months ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller
CASES
2010
ACM
13 years 9 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
AMC
2005
116views more  AMC 2005»
13 years 11 months ago
The design of integrating subliminal channel with access control
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...
Narn-Yih Lee, Shu-Ya Yang
CTRSA
2009
Springer
106views Cryptology» more  CTRSA 2009»
14 years 3 months ago
Communication-Efficient Private Protocols for Longest Common Subsequence
We design communication efficient two-party and multi-party protocols for the longest common subsequence (LCS) and related problems. Our protocols achieve privacy with respect to p...
Matthew K. Franklin, Mark Gondree, Payman Mohassel
ICIS
2001
14 years 17 days ago
Transaction Costs and Market Efficiency
Previous research suggests that a decline in transactions costs leads to improved economic efficiency. In this paper,weshowthatsuchadeclinewillintroduceincreasinglyuninformedconsu...
Bin Gu, Lorin M. Hitt