Sciweavers

6195 search results - page 135 / 1239
» Cloud Computing Security
Sort
View
CGI
2003
IEEE
15 years 9 months ago
Fast Volumetric Display of Natural Gaseous Phenomena
Mesh simplification algorithms play an important role in computer graphics. In particular, view-dependent simplification methods are utilized widely to reduce the geometric comp...
Stefan Röttger, Thomas Ertl
SCN
2010
Springer
129views Communications» more  SCN 2010»
15 years 2 months ago
Improved Primitives for Secure Multiparty Integer Computation
We consider a collection of related multiparty computation protocols that provide core operations for secure integer and fixed-point computation. The higher-level protocols offer...
Octavian Catrina, Sebastiaan de Hoogh
PERCOM
2004
ACM
16 years 3 months ago
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Roshan K. Thomas, Ravi S. Sandhu
CSREASAM
2006
15 years 5 months ago
Adaptive Security Metrics for Computer Systems
The major concern for a computer system is its security and integrity. It is necessary to check the security level of your system and keep it updated. This can be best achieved by ...
Satish Baddelpeli, Gregory Vert
IACR
2011
94views more  IACR 2011»
14 years 3 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...