Sciweavers

1005 search results - page 62 / 201
» Practical Secure Function Evaluation
Sort
View
JWSR
2008
241views more  JWSR 2008»
15 years 16 days ago
A Model-Driven Development Framework for Non-Functional Aspects in Service Oriented Architecture
: Service Oriented Architecture (SOA) is an emerging style of software architectures to reuse and integrate existing systems for designing new applications. Each application is des...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
126
Voted
MSWIM
2009
ACM
15 years 7 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...
CCS
2008
ACM
15 years 2 months ago
FairplayMP: a system for secure multi-party computation
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the great achievements of modern cryptograp...
Assaf Ben-David, Noam Nisan, Benny Pinkas
94
Voted
PODS
2008
ACM
123views Database» more  PODS 2008»
16 years 21 days ago
Evaluating rank joins with optimal cost
In the rank join problem, we are given a set of relations and a scoring function, and the goal is to return the join results with the top K scores. It is often the case in practic...
Karl Schnaitter, Neoklis Polyzotis
110
Voted
CCS
2007
ACM
15 years 6 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu