Sciweavers

621 search results - page 26 / 125
» Efficient Secure Multi-party Computation
Sort
View
101
Voted
CIS
2006
Springer
15 years 4 months ago
Senior Executives Commitment to Information Security - from Motivation to Responsibility
For senior executives, information security is a basic requirement for business success. Yet, despite being well-motivated, top managers often have only a superficial understandin...
Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo...
131
Voted
EUROPKI
2006
Springer
15 years 4 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
99
Voted
JCP
2006
120views more  JCP 2006»
15 years 13 days ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
87
Voted
HPCS
2005
IEEE
15 years 6 months ago
Comparison of Advanced Authorisation Infrastructures for Grid Computing
The widespread use of Grid technology and distributed compute power, with all its inherent benefits, will only be established if the use of that technology can be guaranteed effic...
A. J. Stell, Richard O. Sinnott, J. P. Watt
NBIS
2009
Springer
15 years 7 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...