Sciweavers

3115 search results - page 31 / 623
» Synthesizing Secure Protocols
Sort
View
WISTP
2007
Springer
14 years 3 months ago
Securing the Distribution and Storage of Secrets with Trusted Platform Modules
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platforms. The protocol maintains the confidentiality of secrets in the face of eaves...
Paul E. Sevinç, Mario Strasser, David A. Ba...
ACSAC
1999
IEEE
14 years 1 months ago
Towards a Practical, Secure, and Very Large Scale Online Election
We propose in this paper a practical and secure electronic voting protocol for large-scale online elections. Our protocol satisfies a large set of important criteria that has neve...
Jared Karro, Jie Wang
CSFW
2009
IEEE
14 years 3 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...
SEFM
2007
IEEE
14 years 3 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi
ICDE
2009
IEEE
168views Database» more  ICDE 2009»
14 years 10 months ago
Privacy-Preserving Singular Value Decomposition
Abstract-- In this paper, we propose secure protocols to perform Singular Value Decomposition (SVD) for two parties over horizontally and vertically partitioned data. We propose va...
Shuguo Han, Wee Keong Ng, Philip S. Yu