Sciweavers

6861 search results - page 119 / 1373
» Security for Ubiquitous Computing
Sort
View
SCN
2008
Springer
142views Communications» more  SCN 2008»
13 years 10 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
UIST
1995
ACM
14 years 2 months ago
The World Through the Computer: Computer Augmented Interaction with Real World Environments
Current user interface techniques such as WIMP or the desktop metaphor do not support real world tasks, because the focus of these user interfaces is only on human–computer inte...
Jun Rekimoto, Katashi Nagao
PROVSEC
2009
Springer
14 years 5 months ago
GUC-Secure Set-Intersection Computation
Secure set-intersection computation is one of important problems in secure multiparty computation with various applications. We propose a general construction for secure 2-party se...
Yuan Tian, Hao Zhang
MOC
2010
13 years 5 months ago
Computing a lower bound for the canonical height on elliptic curves over number fields
Computing a lower bound for the canonical height is a crucial step in determining a Mordell
Thotsaphon Thongjunthug
MOBIQUITOUS
2007
IEEE
14 years 5 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra