Sciweavers

5665 search results - page 213 / 1133
» Introduction to Computer Security
Sort
View
97
Voted
OOPSLA
2010
Springer
14 years 11 months ago
Language virtualization for heterogeneous parallel computing
As heterogeneous parallel systems become dominant, application developers are being forced to turn to an incompatible mix of low level programming models (e.g. OpenMP, MPI, CUDA, ...
Hassan Chafi, Zach DeVito, Adriaan Moors, Tiark Ro...
138
Voted
SDMW
2010
Springer
14 years 10 months ago
Computationally Efficient Searchable Symmetric Encryption
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little ...
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, P...
74
Voted
ISORC
2007
IEEE
15 years 6 months ago
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Co...
Christoph Becker, Sebastian Staamann, Ralf Salomon
AINA
2005
IEEE
15 years 6 months ago
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang
128
Voted
CRYPTO
1990
Springer
79views Cryptology» more  CRYPTO 1990»
15 years 4 months ago
Fair Computation of General Functions in Presence of Immoral Majority
This paper describes a method for n players, a majority of which may be faulty, to compute correctly, privately, and fairly any computable function f(Xl, ...,x,) where xi is the i...
Shafi Goldwasser, Leonid A. Levin