Sciweavers

24529 search results - page 266 / 4906
» Computing on Authenticated Data
Sort
View
128
Voted
FOCS
2002
IEEE
15 years 8 months ago
On the (non)Universality of the One-Time Pad
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g., encryption) must be probabilistic. As a bstraction, it is...
Yevgeniy Dodis, Joel Spencer
175
Voted
PODC
1994
ACM
15 years 7 months ago
Using Belief to Reason about Cache Coherence
The notion of belief has been useful in reasoning about authentication protocols. In this paper, we show how the notion of belief can be applied to reasoning about cache coherence...
Lily B. Mummert, Jeannette M. Wing, Mahadev Satyan...
141
Voted
BIRTHDAY
2012
Springer
13 years 11 months ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay
141
Voted
CORR
2010
Springer
388views Education» more  CORR 2010»
15 years 3 months ago
Research Challenges for Enterprise Cloud Computing
Cloud computing represents a shift away from computing as a product that is purchased, to computing as a service that is delivered to consumers over the internet from large-scale ...
Ali Khajeh-Hosseini, Ian Sommerville, Ilango Srira...
159
Voted
SIGMOD
2003
ACM
162views Database» more  SIGMOD 2003»
16 years 3 months ago
DBGlobe: a service-oriented P2P system for global computing
The challenge of peer-to-peer computing goes beyond simple file sharing. In the DBGlobe project, we view the multitude of peers carrying data and services as a superdatabase. Our ...
Evaggelia Pitoura, Serge Abiteboul, Dieter Pfoser,...