Sciweavers

4263 search results - page 216 / 853
» Network Security
Sort
View
149
Voted
EUROCRYPT
2007
Springer
15 years 10 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
MAS
1998
Springer
145views Communications» more  MAS 1998»
15 years 8 months ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith
PODC
2010
ACM
15 years 8 months ago
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy
Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted p...
Christoph Lucas, Dominik Raub, Ueli M. Maurer
ACSW
2006
15 years 5 months ago
Formal analysis of card-based payment systems in mobile devices
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment p...
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Hu...
IPSN
2010
Springer
15 years 10 months ago
A vehicular surveillance and sensing system for car security and tracking applications
In this paper, we propose a Vehicular Surveillance and Sensing System (VS3 ), which targets at car security and tracking applications. VS3 can be triggered by events detected insi...
Lien-Wu Chen, Kun-Ze Syue, Yu-Chee Tseng