Sciweavers

5324 search results - page 148 / 1065
» Internet Security Protocols
Sort
View
SCN
2008
Springer
142views Communications» more  SCN 2008»
14 years 10 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
CCS
2007
ACM
15 years 4 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
CACM
2002
77views more  CACM 2002»
14 years 10 months ago
Security considerations for remote electronic voting
This paper discusses the security considerations for remote electronic voting in public elections. In particular, we examine the feasibility of running national federal elections ...
Aviel D. Rubin
ASIACRYPT
2008
Springer
15 years 2 days ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
90
Voted
CCS
2011
ACM
13 years 10 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum