Sciweavers

5476 search results - page 4 / 1096
» Resettably Secure Computation
Sort
View
WISA
2010
Springer
14 years 9 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
85
Voted
MOC
2010
14 years 6 months ago
Computing matrix representations
Let G be a ...nite group and be a faithful irreducible character for G. Earlier papers by the ...rst author describe techniques for computing a matrix representation for G which a
Vahid Dabbaghian, John D. Dixon
109
Voted
ICICS
2010
Springer
14 years 9 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
SERVICES
2010
201views more  SERVICES 2010»
14 years 6 months ago
IT Auditing to Assure a Secure Cloud Computing
In this paper we discuss the evolvement of cloud computing paradigm and present a framework for secure cloud computing through IT auditing. Our approach is to establish a general ...
Zhixiong Chen, John Yoon
CRYPTO
2012
Springer
262views Cryptology» more  CRYPTO 2012»
13 years 2 months ago
Functional Encryption with Bounded Collusions via Multi-party Computation
We construct a functional encryption scheme secure against an a-priori bounded polynomial number of collusions for the class of all polynomial-size circuits. Our constructions req...
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee