Sciweavers

348 search results - page 1 / 70
» Secure Computation on the Web: Computing without Simultaneou...
Sort
View
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 4 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
CORR
2008
Springer
166views Education» more  CORR 2008»
13 years 4 months ago
Information-Theoretically Secure Voting Without an Honest Majority
We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities...
Anne Broadbent, Alain Tapp
CHI
2004
ACM
14 years 5 months ago
Multiblending: displaying overlapping windows simultaneously without the drawbacks of alpha blending
Alpha blending allows the simultaneous display of overlapping windows--such as palette windows in visual workspaces. Although alpha blending has been used in some applications, su...
Patrick Baudisch, Carl Gutwin
ICWS
2007
IEEE
13 years 6 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
SRDS
2010
IEEE
13 years 2 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...