Sciweavers

5476 search results - page 4 / 1096
» Resettably Secure Computation
Sort
View
WISA
2010
Springer
14 years 11 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
102
Voted
MOC
2010
14 years 8 months ago
Computing matrix representations
Let G be a ...nite group and be a faithful irreducible character for G. Earlier papers by the ...rst author describe techniques for computing a matrix representation for G which a
Vahid Dabbaghian, John D. Dixon
ICICS
2010
Springer
14 years 11 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
164
Voted
SERVICES
2010
201views more  SERVICES 2010»
14 years 8 months ago
IT Auditing to Assure a Secure Cloud Computing
In this paper we discuss the evolvement of cloud computing paradigm and present a framework for secure cloud computing through IT auditing. Our approach is to establish a general ...
Zhixiong Chen, John Yoon
139
Voted
CRYPTO
2012
Springer
262views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
Functional Encryption with Bounded Collusions via Multi-party Computation
We construct a functional encryption scheme secure against an a-priori bounded polynomial number of collusions for the class of all polynomial-size circuits. Our constructions req...
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee