Sciweavers

1656 search results - page 145 / 332
» Secure Computation Without Authentication
Sort
View
EGC
2005
Springer
15 years 6 months ago
HotGrid: Graduated Access to Grid-Based Science Gateways
Abstract. We describe the idea of a Science Gateway, an applicationspecific task wrapped as a web service, and some examples of these that are being implemented on the US TeraGrid...
Roy Williams, Conrad Steenberg, Julian J. Bunn
107
Voted
ASIACRYPT
2004
Springer
15 years 6 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
85
Voted
FAST
2003
15 years 2 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ļ¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
84
Voted
FSTTCS
2009
Springer
15 years 7 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
96
Voted
SAC
2010
ACM
15 years 7 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...