Sciweavers

5722 search results - page 168 / 1145
» Security Function Interactions
Sort
View
91
Voted
CORR
2008
Springer
166views Education» more  CORR 2008»
15 years 24 days ago
Information-Theoretically Secure Voting Without an Honest Majority
We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities...
Anne Broadbent, Alain Tapp
PERVASIVE
2006
Springer
15 years 19 days ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
101
Voted
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
16 years 25 days ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
131
Voted
ISCIS
2005
Springer
15 years 6 months ago
A Secure Communication Framework for Mobile Agents
Abstract. Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent system...
Suat Ugurlu, Nadia Erdogan
116
Voted
CSE
2009
IEEE
15 years 4 months ago
A Unified Approach to Intra-domain Security
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to sec...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta