Sciweavers

1825 search results - page 106 / 365
» Cryptographic Securities Exchanges
Sort
View
117
Voted
JCDL
2003
ACM
103views Education» more  JCDL 2003»
15 years 9 months ago
SCENS: A System for the Mediated Sharing of Sensitive Data
1 This paper introduces SCENS, a Secure Content Exchange Negotiation System suitable for the exchange of private digital data that reside in distributed digital repositories. SCENS...
Song Ye, Fillia Makedon, Tilmann Steinberg, Li She...
106
Voted
TGC
2005
Springer
15 years 9 months ago
A Formal Semantics for Protocol Narrations
Protocol narrations are an informal means to describe, in an idealistic manner, the functioning of cryptographic protocols as a single intended sequence of cryptographic message ex...
Sébastien Briais, Uwe Nestmann
114
Voted
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 10 months ago
A Secure Authentication Policy for UMTS and WLAN Interworking
—We propose a security authentication policy, Dynamic Session Key Policy (DSKP), for a secure handoff between the UMTS and IEEE 802.11 WLAN. This policy is founded and improved f...
Yen-Chieh Ouyang, Chang-Bu Jang, Hung-Ta Chen
119
Voted
USENIX
1994
15 years 5 months ago
SNP: An Interface for Secure Network Programming
SNP provides a high-level abstraction for secure end-toend network communications. It supports both stream and datagram semantics with security guarantees (e.g., data originauthen...
Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su...
128
Voted
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 4 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena