Sciweavers

5484 search results - page 16 / 1097
» Almost-Everywhere Secure Computation
Sort
View
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 9 days ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
69
Voted
ICALP
2000
Springer
15 years 3 months ago
One-Round Secure Computation and Secure Autonomous Mobile Agents
d Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M
Christian Cachin, Jan Camenisch, Joe Kilian, Joy M...
STOC
2004
ACM
94views Algorithms» more  STOC 2004»
16 years 2 days ago
Completeness in two-party secure computation: a computational view
Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen
CSREASAM
2008
15 years 1 months ago
Securing Security Policies in Autonomic Computing Systems
Ghassan Jabbour, Daniel A. Menascé