Sciweavers

5484 search results - page 45 / 1097
» Almost-Everywhere Secure Computation
Sort
View
HICSS
2011
IEEE
386views Biometrics» more  HICSS 2011»
14 years 3 months ago
Cloud Hooks: Security and Privacy Issues in Cloud Computing
In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that...
Wayne A. Jansen
ACSAC
2000
IEEE
15 years 4 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer
ICICS
2009
Springer
15 years 6 months ago
Secure Remote Execution of Sequential Computations
Abstract. We describe a scheme that secures the remote execution of sequential computations in grid-computing scenarios. To the best of our knowledge, this is the first contributi...
Ghassan Karame, Mario Strasser, Srdjan Capkun
EUROPAR
2008
Springer
15 years 1 months ago
Building Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments
Abstract. Security and fault-tolerance is a big issue for intensive parallel computing in pervasive environments with hardware errors or malicious acts that may alter the result. I...
Sébastien Varrette, Jean-Louis Roch, Guilla...
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
16 years 11 days ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai