Sciweavers

242 search results - page 13 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
ICALP
2009
Springer
15 years 9 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...
OSDI
2008
ACM
15 years 9 months ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
WSDM
2012
ACM
334views Data Mining» more  WSDM 2012»
13 years 5 months ago
mTrust: discerning multi-faceted trust in a connected world
Traditionally, research about trust assumes a single type of trust between users. However, trust, as a social concept, inherently has many facets indicating multiple and heterogen...
Jiliang Tang, Huiji Gao, Huan Liu
WPES
2006
ACM
15 years 3 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 1 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena