Sciweavers

1627 search results - page 72 / 326
» High Security Smartcards
Sort
View
AINA
2008
IEEE
15 years 6 months ago
Transparently Adding Security Properties to Service Orchestration
In this paper, we present a tool allowing the design of orchestration at a high level of abstraction. This tool also allows specifying security properties, also in an way, as anno...
Stéphanie Chollet, Philippe Lalanda, Andr&e...
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
15 years 3 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz
LISA
2004
15 years 1 months ago
Making a Game of Network Security
This paper describes our experiences in the design and implementation of a network for security training exercises, and one such exercise. The network described herein is flexible...
Marc Dougherty
NCA
2005
IEEE
15 years 5 months ago
Networking Aspects in the DPASA Survivability Architecture: An Experience Report
The same network infrastructure that is essential for the operation of today’s high valued distributed systems can also be misused by malicious attackers. Experience shows that ...
Michael Atighetchi, Paul Rubel, Partha Pratim Pal,...
GLOBECOM
2009
IEEE
15 years 6 months ago
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling
—In this work, we prove that a positive secure degree of freedom is achievable for a large class of real Gaussian channels as long as the channel is not degraded and the channel ...
Xiang He, Aylin Yener