Sciweavers

1770 search results - page 49 / 354
» Writing requirements in computer security
Sort
View
EUROCRYPT
2007
Springer
14 years 1 months ago
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Protocols proven secure within the universal composability (UC) framework satisfy strong and desirable security properties. Unfortunately, it is known that within the “plain” m...
Jonathan Katz
ITIIS
2010
128views more  ITIIS 2010»
13 years 6 months ago
Semi-trusted Collaborative Framework for Multi-party Computation
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
Kok Seng Wong, Myung Ho Kim
ICPR
2002
IEEE
14 years 19 days ago
A Comparison of Techniques for Automatic Clustering of Handwritten Characters
This work reports experiments with four hierarchical clustering algorithms and two clustering indices for online handwritten characters. The main motivation of the work is to deve...
Vuokko Vuori, Jorma Laaksonen
WCNC
2008
IEEE
14 years 2 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
IJOE
2008
98views more  IJOE 2008»
13 years 7 months ago
OpenLabs Security Laboratory - The Online Security Experiment Platform
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Johan Zackrisson, Charlie Svahnberg