Sciweavers

66 search results - page 6 / 14
» Parallel Reducibility for Information-Theoretically Secure C...
Sort
View
ICPPW
2003
IEEE
15 years 2 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
70
Voted
DATE
2007
IEEE
114views Hardware» more  DATE 2007»
15 years 4 months ago
Performance aware secure code partitioning
Many embedded applications exist where decisions are made using sensitive information. A critical issue in such applications is to ensure that data is accessed only by authorized ...
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...
CCGRID
2006
IEEE
15 years 3 months ago
Nova: An Approach to On-Demand Virtual Execution Environments for Grids
This paper attempts to reduce the overheads of dynamically creating and destroying the virtual environments for secure job execution. It broaches a grid architecture which we call...
Srikanth Sundarrajan, Hariprasad Nellitheertha, Su...
88
Voted
EUROCRYPT
2000
Springer
15 years 1 months ago
Minimal-Latency Secure Function Evaluation
Sander, Young and Yung recently exhibited a protocol for computing on encrypted inputs, for functions computable in NC1 . In their variant of secure function evaluation, Bob (the &...
Donald Beaver
ISPA
2005
Springer
15 years 3 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...