Sciweavers

5476 search results - page 17 / 1096
» Resettably Secure Computation
Sort
View
ICSOC
2009
Springer
14 years 11 months ago
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware
With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to ...
Weishan Zhang, Julian Schütte, Mads Ingstrup,...
58
Voted
COMPUTER
1998
69views more  COMPUTER 1998»
15 years 1 months ago
Integrating Security into the Curriculum
Cynthia E. Irvine, Shiu-Kai Chin, Deborah A. Frinc...
FOCS
2010
IEEE
14 years 12 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
125
Voted
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
ICITS
2009
14 years 11 months ago
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computat...
Koji Nuida, Goichiro Hanaoka