Sciweavers

556 search results - page 37 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
CRYPTO
1999
Springer
103views Cryptology» more  CRYPTO 1999»
15 years 4 months ago
Information Theoretically Secure Communication in the Limited Storage Space Model
Abstract. We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-s...
Yonatan Aumann, Michael O. Rabin
ICCS
2005
Springer
15 years 5 months ago
GIVS: Integrity Validation for Grid Security
Abstract. In this paper we address the problem of granting the correctness of Grid computations. We introduce a Grid Integrity Validation Scheme (GIVS) that may reveal the presence...
Giuliano Casale, Stefano Zanero
CCGRID
2004
IEEE
15 years 3 months ago
Distributed virtual computers (DVC): simplifying the development of high performance Grid applications
Distributed Virtual Computer (DVC) is a computing environment which simplifies the development and execution of distributed applications on computational grids. DVC provides a sim...
Nut Taesombut, Andrew A. Chien
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 6 months ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao
SIGCOMM
2012
ACM
13 years 2 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...