Sciweavers

5476 search results - page 24 / 1096
» Resettably Secure Computation
Sort
View
JCS
2010
121views more  JCS 2010»
15 years 3 months ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh
INFOCOM
2012
IEEE
13 years 7 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
TGC
2010
Springer
15 years 3 months ago
Probabilistic Aspects: Checking Security in an Imperfect World
Chris Hankin, Flemming Nielson, Hanne Riis Nielson
CSUR
2011
15 years 12 days ago
A survey of DHT security techniques
Guido Urdaneta, Guillaume Pierre, Maarten van Stee...
TDSC
2011
15 years 10 days ago
Securing Topology Maintenance Protocols for Sensor Networks
Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia,...