Sciweavers

1449 search results - page 11 / 290
» Secure and Efficient Metering
Sort
View
ACISP
2007
Springer
13 years 11 months ago
Efficient and Secure Comparison for On-Line Auctions
In this note, we describe a correction to the cryptosystem proposed in [1, 2]. Although the correction is small and does not affect the performance of the protocols from [1, 2], it...
Ivan Damgård, Martin Geisler, Mikkel Kr&osla...
SCN
2008
Springer
142views Communications» more  SCN 2008»
13 years 7 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
SPW
2001
Springer
13 years 12 months ago
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
William Aiello, Steven M. Bellovin, Matt Blaze, Ra...
WISTP
2009
Springer
14 years 2 months ago
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
Christian Lederer, Roland Mader, Manuel Koschuch, ...
CCS
2010
ACM
13 years 10 months ago
PAriCheck: an efficient pointer arithmetic checker for C programs
Yves Younan, Pieter Philippaerts, Lorenzo Cavallar...