Sciweavers

8655 search results - page 228 / 1731
» Challenges for Trusted Computing
Sort
View
EUROCRYPT
2003
Springer
15 years 4 months ago
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions
The recently proposed universally composable (UC) security framework for analyzing security of cryptographic protocols provides very strong security guarantees. In particular, a p...
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
13 years 1 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
IPPS
1999
IEEE
15 years 3 months ago
High Performance Computing for the Masses
Abstract. Recent advances in software and hardware for clustered computing have allowed scientists and computing specialists to take advantage of commodity processors in solving ch...
Mark J. Clement, Quinn Snell, Glenn Judd
AICCSA
2007
IEEE
108views Hardware» more  AICCSA 2007»
15 years 5 months ago
On Secure Consensus Information Fusion over Sensor Networks
In this work we have examined the problem of consensus information fusion from a novel point of view, challenging the fundamental assumption of mutual trust among the fusion parti...
Mahdi Kefayati, Mohammad Sadegh Talebi, Hamid R. R...
JECR
2002
151views more  JECR 2002»
14 years 10 months ago
The Ethics of eBanking
In this paper we explore the ethics of business-to-business electronic commerce, with a focus on the banking sector. A case study of online foreign exchange developments at an inv...
Lisa Harris, Laura J. Spence