Sciweavers

5665 search results - page 182 / 1133
» Introduction to Computer Security
Sort
View
PET
2004
Springer
15 years 6 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
73
Voted
ANCS
2007
ACM
15 years 4 months ago
Design of a network architecture with inherent data path security
Next-generation Internet architectures require designs with inherent security guarantees. We present a network architecture that uses credentials to audit traffic in the data path...
Tilman Wolf
55
Voted
CHI
2007
ACM
16 years 1 months ago
Designing software for consumers to easily set up a secure home network
Brenton Elmore, Stuart Hamilton, Subbarao Ivaturi
54
Voted
CHI
2007
ACM
16 years 1 months ago
Security user studies: methodologies and best practices
Serge Egelman, Jennifer King, Robert C. Miller, Ni...
CORR
2007
Springer
74views Education» more  CORR 2007»
15 years 18 days ago
Secure Two-party Protocols for Point Inclusion Problem
It is well known that, in theory, the general secure multiparty computation problem is solvable using circuit evaluation protocols. However, the communication complexity of the re...
Tony Thomas