Sciweavers

1825 search results - page 112 / 365
» Cryptographic Securities Exchanges
Sort
View
157
Voted
SASN
2003
ACM
15 years 9 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
151
Voted
GRC
2008
IEEE
15 years 4 months ago
Scalar-product based Secure Two-party Computation
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-...
145
Voted
JNW
2006
186views more  JNW 2006»
15 years 3 months ago
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)
In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standard...
Muhammad Sher, Thomas Magedanz
138
Voted
FOCS
2010
IEEE
15 years 1 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
147
Voted
NOSSDAV
2009
Springer
15 years 8 months ago
Secure multimedia content delivery with multiparty multilevel DRM architecture
For scalability of business, multiparty multilevel digital rights management (DRM) architecture, where a multimedia content is delivered by an owner to a consumer through several ...
Tony Thomas, Sabu Emmanuel, Amitabha Das, Mohan S....