Sciweavers

6195 search results - page 192 / 1239
» Cloud Computing Security
Sort
View
FOCS
2010
IEEE
15 years 2 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
13 years 7 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
WETICE
2003
IEEE
15 years 9 months ago
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock
COMPUTER
2010
103views more  COMPUTER 2010»
15 years 4 months ago
Interview: Software Security in the Real World
Ann E. Kelley Sobel, Gary McGraw
COMPUTER
2008
114views more  COMPUTER 2008»
15 years 4 months ago
Automated Code Review Tools for Security
Gary McGraw