Sciweavers

8655 search results - page 146 / 1731
» Challenges for Trusted Computing
Sort
View
NSDI
2008
15 years 13 days ago
Overcoming Challenges of Maturity
In 2008, the systems and networks research communities find themselves victims of their own successes. This white paper reviews some of the evidence that the two areas are under e...
Ken Birman
TCC
2009
Springer
124views Cryptology» more  TCC 2009»
15 years 10 months ago
Universally Composable Multiparty Computation with Partially Isolated Parties
It is well known that universally composable multiparty computation cannot, in general, be achieved in the standard model without setup assumptions when the adversary can corrupt a...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...
JOC
2000
95views more  JOC 2000»
14 years 10 months ago
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Martin Hirt, Ueli M. Maurer
ESCIENCE
2006
IEEE
15 years 4 months ago
Managing Large-Scale Scientific Workflows in Distributed Environments: Experiences and Challenges
In this paper we discuss several challenges associated scientific workflow design and management in distributed, heterogeneous environments. Based on our prior work with a number ...
Ewa Deelman, Yolanda Gil
NA
2008
72views more  NA 2008»
14 years 10 months ago
The numerical evaluation of a challenging integral
Standard numerical analysis tools, combined with elementary calculus, are deployed to evaluate a densely and wildly oscillatory integral proposed as a computational problem in the...
Walter Gautschi