Sciweavers

6861 search results - page 120 / 1373
» Security for Ubiquitous Computing
Sort
View
CCS
2008
ACM
14 years 24 days ago
Computationally sound mechanized proofs for basic and public-key Kerberos
Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, J...
OOPSLA
2010
Springer
13 years 8 months ago
What can the GC compute efficiently?: a language for heap assertions at GC time
Christoph Reichenbach, Neil Immerman, Yannis Smara...
WISA
2010
Springer
13 years 8 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
CG
2006
Springer
13 years 11 months ago
Supporting content scheduling on situated public displays
There is increasing interest in creating networks of situated public displays that offer novel forms of interaction and rich media content
Oliver Storz, Adrian Friday, Nigel Davies
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 10 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas