Sciweavers

5484 search results - page 20 / 1097
» Almost-Everywhere Secure Computation
Sort
View
WISA
2010
Springer
14 years 9 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
CCS
2010
ACM
15 years 6 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
CHI
2011
ACM
14 years 3 months ago
Data type based security alert dialogs
Max-Emanuel Maurer, Alexander De Luca, Heinrich Hu...