Sciweavers

5484 search results - page 39 / 1097
» Almost-Everywhere Secure Computation
Sort
View
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
15 years 5 months ago
Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive?
This article empirically examines the awareness, concern, and actions of home-based small business owners regarding Internet-based computer security risks. A scientific, Internet-...
David W. Johnson, Harold Koch
CRYPTO
2006
Springer
99views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
Scalable Secure Multiparty Computation
We present the first general protocol for secure multiparty computation which is scalable, in the sense that the amortized work per player does not grow, and in some natural settin...
Ivan Damgård, Yuval Ishai
COMPUTER
2004
120views more  COMPUTER 2004»
14 years 11 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
JAMIA
2011
68views more  JAMIA 2011»
14 years 2 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...