Sciweavers

1471 search results - page 12 / 295
» Composing concurrency control
Sort
View
EUROCRYPT
2003
Springer
15 years 2 months ago
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions
The recently proposed universally composable (UC) security framework for analyzing security of cryptographic protocols provides very strong security guarantees. In particular, a p...
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
ICDE
2005
IEEE
143views Database» more  ICDE 2005»
15 years 11 months ago
Postgres-R(SI): Combining Replica Control with Concurrency Control based on Snapshot Isolation
Replicating data over a cluster of workstations is a powerful tool to increase performance, and provide faulttolerance for demanding database applications. The big challenge in su...
Shuqing Wu, Bettina Kemme
EUROCRYPT
2007
Springer
15 years 3 months ago
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Protocols proven secure within the universal composability (UC) framework satisfy strong and desirable security properties. Unfortunately, it is known that within the “plain” m...
Jonathan Katz
FOCS
2004
IEEE
15 years 1 months ago
Universally Composable Protocols with Relaxed Set-Up Assumptions
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally Composable (UC) protocols provide th...
Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafa...