Sciweavers

6137 search results - page 99 / 1228
» Securing Collaborative Applications
Sort
View
ACSAC
2001
IEEE
14 years 17 days ago
Secure Anonymous Group Infrastructure for Common and Future Internet Applications
Secure group communication protocols, in particular multi-party key agreement and update algorithms, help promote traditional and new Internet multi-party applications such as vid...
Nathalie Weiler
ACNS
2010
Springer
134views Cryptology» more  ACNS 2010»
13 years 10 months ago
Efficient and Secure Evaluation of Multivariate Polynomials and Applications
In this work, we design two-party and multiparty protocols for evaluating multivariate polynomials at participants' inputs with security against a malicious adversary who may ...
Matthew K. Franklin, Payman Mohassel
IPPS
2005
IEEE
14 years 2 months ago
Speculative Security Checks in Sandboxing Systems
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the sandboxing systems proposed so far provide security by intercepting system call...
Yoshihiro Oyama, Koichi Onoue, Akinori Yonezawa
CSFW
2009
IEEE
14 years 3 months ago
Policy Compliance in Collaborative Systems
When collaborating agents share sensitive information to achieve a common goal it would be helpful to them to decide whether doing so will lead to an unwanted release of confiden...
Max I. Kanovich, Paul Rowe, Andre Scedrov
ICMCS
1999
IEEE
107views Multimedia» more  ICMCS 1999»
14 years 1 months ago
Resource Negotiation for Collaborative Multimedia Presentations
Distributed multimedia documents systems, distributed video servers are examples of multimedia presentations involving collaboration among multiple information sources. In such ap...
B. Prabhakaran