Sciweavers

5476 search results - page 24 / 1096
» Resettably Secure Computation
Sort
View
JCS
2010
121views more  JCS 2010»
15 years 11 days ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh
INFOCOM
2012
IEEE
13 years 4 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
TGC
2010
Springer
14 years 11 months ago
Probabilistic Aspects: Checking Security in an Imperfect World
Chris Hankin, Flemming Nielson, Hanne Riis Nielson
103
Voted
CSUR
2011
14 years 9 months ago
A survey of DHT security techniques
Guido Urdaneta, Guillaume Pierre, Maarten van Stee...
TDSC
2011
14 years 8 months ago
Securing Topology Maintenance Protocols for Sensor Networks
Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia,...