Sciweavers

334 search results - page 59 / 67
» trust 2010
Sort
View
CORR
2010
Springer
86views Education» more  CORR 2010»
13 years 9 months ago
Secure Multiparty Computation with Partial Fairness
A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation where parties give their inputs to a truste...
Amos Beimel, Eran Omri, Ilan Orlov
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 8 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
TISSEC
2010
237views more  TISSEC 2010»
13 years 5 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
ISSTA
2010
ACM
14 years 2 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
APPROX
2010
Springer
139views Algorithms» more  APPROX 2010»
14 years 13 days ago
Two-Source Extractors Secure against Quantum Adversaries
We initiate the study of multi-source extractors in the quantum world. In this setting, our goal is to extract random bits from two independent weak random sources, on which two q...
Roy Kasher, Julia Kempe