Sciweavers

5324 search results - page 95 / 1065
» Internet Security Protocols
Sort
View
WISA
2010
Springer
14 years 7 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
CSFW
1998
IEEE
15 years 2 months ago
Honest Ideals on Strand Spaces
In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. W...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
CRYPTO
2001
Springer
144views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
In this paper we show that any two-party functionality can be securely computed in a constant number of rounds, where security is obtained against malicious adversaries that may ar...
Yehuda Lindell
INFOCOM
2008
IEEE
15 years 4 months ago
A New Perspective on Internet Security using Insurance
—Managing security risks in the Internet has so far mostly involved methods to reduce the risks and the severity of the damages. Those methods (such as firewalls, intrusion dete...
Jean-Chrysostome Bolot, Marc Lelarge
EVOTING
2004
94views Hardware» more  EVOTING 2004»
14 years 11 months ago
How Security Problems can Compromise Remote Internet Voting Systems
: Remote Internet voting systems still suffer from many security problems which rely on the clients, the servers, and the network connections. Denial-ofservice attacks and viruses ...
Guido Schryen