Sciweavers

5722 search results - page 84 / 1145
» Security Function Interactions
Sort
View
KESAMSTA
2007
Springer
15 years 7 months ago
Mobile Collaboration Framework for u-Healthcare Agent Services and Its Application Using PDAs
In this paper, we suggested a mobile collaboration framework based on distributed object group framework (DOGF). This paper focuses on the use of this framework to support mobile c...
Chang-Won Jeong, Dong-Ho Kim, Su-Chong Joo
115
Voted
CTRSA
2008
Springer
197views Cryptology» more  CTRSA 2008»
15 years 2 months ago
Legally-Enforceable Fairness in Secure Two-Party Computation
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should...
Andrew Y. Lindell
CSFW
2000
IEEE
15 years 4 months ago
Towards Automatic Verification of Authentication Protocols on an Unbounded Network
Schneider's work on rank functions [14] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only wit...
James Heather, Steve Schneider
109
Voted
ACSAC
1998
IEEE
15 years 5 months ago
Security Services in an Open Service Environment
Emerging telecommunication services use, store, or transmit sensitive personal data to form individual network services. We suggest an add-on approach to realize secure telecommun...
Reiner Sailer
97
Voted
ICFP
2007
ACM
16 years 23 days ago
Tangible functional programming
We present a user-friendly approach to unifying program creation and execution, based on a notion of "tangible values" (TVs), which are visual and interactive manifestat...
Conal Elliott