Sciweavers

5476 search results - page 10 / 1096
» Resettably Secure Computation
Sort
View
123
Voted
ECCC
2011
223views ECommerce» more  ECCC 2011»
14 years 8 months ago
A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation
Gilad Asharov, Yehuda Lindell
116
Voted
JDCTA
2010
172views more  JDCTA 2010»
14 years 8 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
69
Voted
JNCA
2010
85views more  JNCA 2010»
14 years 8 months ago
Adaptive security protocol selection for mobile computing
Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Mo...
97
Voted
CORR
2011
Springer
331views Education» more  CORR 2011»
14 years 5 months ago
An Overview of the Security Concerns in Enterprise Cloud Computing
Anthony Bisong, Syed M. Rahman