Sciweavers

1373 search results - page 46 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
EUROCRYPT
1998
Springer
14 years 25 days ago
Quorum-Based Secure Multi-party Computation
Abstract. This paper describes e cient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to...
Donald Beaver, Avishai Wool
JDCTA
2010
176views more  JDCTA 2010»
13 years 3 months ago
A Context-Aware Framework using Ontology for Smart Phone Platform
Context-awareness has been considered as promising topic in pervasive computing area, but a review of the existing approaches shown that developing diverse application services in...
Yun Her, Su-Kyoung Kim, YoungTaek Jin
CORR
2007
Springer
109views Education» more  CORR 2007»
13 years 8 months ago
PhantomOS: A Next Generation Grid Operating System
Grid Computing has made substantial advances in the past decade; these are primarily due to the adoption of standardized Grid middleware. However Grid computing has not yet become...
Irfan Habib, Kamran Soomro, Ashiq Anjum, Richard M...
PEWASUN
2005
ACM
14 years 2 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 2 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu