Sciweavers

1338 search results - page 63 / 268
» A Secure Communications Infrastructure for High-Performance ...
Sort
View
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
15 years 7 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
COMCOM
2008
104views more  COMCOM 2008»
15 years 1 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
FOCS
2010
IEEE
14 years 12 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
HCW
1999
IEEE
15 years 6 months ago
Communication Modeling of Heterogeneous Networks of Workstations for Performance Characterization of Collective Operations
: Networks of Workstations (NOW) have become an attractive alternative platform for high performance computing. Due to the commodity nature of workstations and interconnects and du...
Mohammad Banikazemi, Jayanthi Sampathkumar, Sandee...
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
16 years 2 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...