Sciweavers

5843 search results - page 57 / 1169
» Software Security in Practice
Sort
View
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
14 years 9 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
JUCS
2010
89views more  JUCS 2010»
13 years 7 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 6 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
ASIACRYPT
1992
Springer
14 years 1 months ago
Practical Proven Secure Authentication with Arbitration
Yvo Desmedt, Jennifer Seberry