Sciweavers

686 search results - page 137 / 138
» Secure Two-Party Computation Is Practical
Sort
View
ATAL
2004
Springer
13 years 10 months ago
Adaptive Information Infrastructures for the e-Society
Abstract. Positioned at the confluence between human/machine and hardware/software integration and backed by a solid proof of concept realized through several scenarios encompassin...
Mihaela Ulieru
ATAL
2008
Springer
13 years 7 months ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp
CONCURRENCY
2002
152views more  CONCURRENCY 2002»
13 years 5 months ago
The Legion Grid Portal
-- The Legion Grid Portal is an interface to a grid system. Users interact with the portal, and hence a grid through an intuitive interface from which they can view files, submit a...
Anand Natrajan, Anh Nguyen-Tuong, Marty Humphrey, ...
ASIACRYPT
2010
Springer
13 years 3 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 3 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena