Sciweavers

1834 search results - page 244 / 367
» Public Key Cryptography
Sort
View
135
Voted
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
15 years 10 months ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee
ICSE
2000
IEEE-ACM
15 years 8 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
156
Voted
OSDI
1996
ACM
15 years 5 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
IACR
2011
127views more  IACR 2011»
14 years 4 months ago
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
Secure multiparty computation (MPC) allows a set of n players to compute any public function, given as an arithmetic circuit, on private inputs, so that privacy of the inputs as we...
Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky
ELPUB
2008
ACM
15 years 6 months ago
No Budget, No Worries: Free and Open Source Publishing Software in Biomedical Publishing
Open Medicine (http://www.openmedicine.ca) is an electronic open access, peer-reviewed general medical journal that started publication in April 2007. The editors of Open Medicine...
Tarek Loubani, Sally Murray, Claire Kendall, Anita...