Sciweavers

1005 search results - page 82 / 201
» Practical Secure Function Evaluation
Sort
View
94
Voted
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 1 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
124
Voted
IMCIM
1995
15 years 4 months ago
Evaluation of Object-Oriented Database Systems
Despite the fact that object-oriented database systems (OODBS) have gained potential as promising database technology for non-standard applications such as computer integrated manu...
Christian Huemer, Gerti Kappel, S. Rausch-Schott, ...
ATAL
2006
Springer
15 years 2 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
92
Voted
WWW
2008
ACM
16 years 1 months ago
Better abstractions for secure server-side scripting
bstractions for Secure Server-Side Scripting Dachuan Yu Ajay Chander Hiroshi Inamura Igor Serikov DoCoMo Communications Laboratories USA 3240 Hillview Avenue Palo Alto, CA 94304 {y...
Dachuan Yu, Ajay Chander, Hiroshi Inamura, Igor Se...
100
Voted
SOUPS
2009
ACM
15 years 7 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...