Sciweavers

2601 search results - page 238 / 521
» Secure Rewarding Schemes
Sort
View
132
Voted
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
16 years 4 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner
105
Voted
CCGRID
2005
IEEE
15 years 9 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
145
Voted
ENTCS
2008
87views more  ENTCS 2008»
15 years 3 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
107
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Supporting Attribute-based Access Control with Ontologies
In highly open systems like the Internet, attribute-based access control (ABAC) has proven its appropriateness. The specification and maintenance of ABAC policies however has tur...
Torsten Priebe, Wolfgang Dobmeier, Nora Kamprath
130
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Fair On-line Gambling
This paper proposes a fair electronic gambling scheme for the Internet. The proposed scheme provides a unique link between payment and gambling outcome so that the winner can be e...
Weiliang Zhao, Vijay Varadharajan, Yi Mu