Sciweavers

8655 search results - page 351 / 1731
» Challenges for Trusted Computing
Sort
View
175
Voted
CSFW
1992
IEEE
15 years 7 months ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko
125
Voted
FC
2009
Springer
84views Cryptology» more  FC 2009»
15 years 7 months ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersec...
Jan Camenisch, Gregory M. Zaverucha
126
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
123
Voted
ECAI
2006
Springer
15 years 7 months ago
Advanced Policy Explanations on the Web
Abstract. The frameworks for protecting security and privacy can be effective only if common users--with no training in computer science or logic--increase their awareness and cont...
Piero A. Bonatti, Daniel Olmedilla, Joachim Peer
134
Voted
FC
2000
Springer
119views Cryptology» more  FC 2000»
15 years 7 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...