Sciweavers

1597 search results - page 12 / 320
» Mental Models of Computer Security
Sort
View
CONCUR
2008
Springer
15 years 1 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 6 days ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
ESORICS
2006
Springer
15 years 3 months ago
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...
NN
2006
Springer
121views Neural Networks» more  NN 2006»
14 years 11 months ago
Mirror neurons and imitation: A computationally guided review
Neurophysiology reveals the properties of individual mirror neurons in the macaque while brain imaging reveals the presence of `mirror systems' (not individual neurons) in th...
Erhan Oztop, Mitsuo Kawato, Michael A. Arbib
CCS
2006
ACM
15 years 3 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang