Sciweavers

5722 search results - page 139 / 1145
» Security Function Interactions
Sort
View
CCS
2008
ACM
13 years 11 months ago
FairplayMP: a system for secure multi-party computation
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the great achievements of modern cryptograp...
Assaf Ben-David, Noam Nisan, Benny Pinkas
SOUPS
2005
ACM
14 years 2 months ago
Two experiences designing for effective security
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
Rogério de Paula, Xianghua Ding, Paul Douri...
IEEEARES
2007
IEEE
14 years 3 months ago
Effects of Architectural Decisions in Authentication and Authorisation Infrastructures
AAIs – Infrastructures for Authentication and Authorisation provide services for service providers on the Internet. Especially if combined with an attribute infrastructure these...
Christian Schläger, Monika Ganslmayer
CTRSA
2006
Springer
118views Cryptology» more  CTRSA 2006»
14 years 19 days ago
Stand-Alone and Setup-Free Verifiably Committed Signatures
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...
Huafei Zhu, Feng Bao
CDC
2009
IEEE
14 years 1 months ago
Interaction of service providers in task delegation under simple payment rules
— We consider a scenario where an application service provider (ASP) hires a network service provider (NSP) to deliver its service and pays for the employment of the NSP. We stud...
Richard J. La, Jeonghoon Mo