Sciweavers

1777 search results - page 141 / 356
» Programming Cryptographic Protocols
Sort
View
TDP
2010
166views more  TDP 2010»
14 years 8 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
TOOLS
1999
IEEE
15 years 5 months ago
Bounding Component Behavior via Protocols
In this paper we enhance the SOFA Component Description Language with a semantic description of a component's functionality. There are two key requirements this description a...
Frantisek Plasil, Milos Besta, Stanislav Visnovsky
SRDS
2003
IEEE
15 years 6 months ago
Distributed Programming for Dummies: A Shifting Transformation Technique
The perfectly synchronized round model provides the abstraction of crash-stop failures with atomic message delivery. This abstraction makes distributed programming very easy. We p...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
15 years 2 months ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
AICT
2006
IEEE
15 years 7 months ago
Creation of internet-telephony services using Siplet technology
This paper deals with the design of telecommunications services using the SIP protocol. We give an overview of SIP and an overview of the programming models CGI and Servlets toget...
Qiang Fan, Roch H. Glitho, Ahmed Khoumsi