Sciweavers

3420 search results - page 102 / 684
» A Language-Based Approach to Security
Sort
View
ASIACRYPT
2001
Springer
15 years 8 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
119
Voted
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
15 years 8 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
WSC
2007
15 years 6 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
155
Voted
IWUC
2004
15 years 5 months ago
Protecting People on the Move through Virtual Personal Security
Ensuring personal safety for people on the move is becoming a heightened priority in today's uncertain environment. Traditional approaches are no longer adequate in meeting ri...
Dadong Wan, Anatole Gershman
158
Voted
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
15 years 4 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi