Sciweavers

6861 search results - page 120 / 1373
» Security for Ubiquitous Computing
Sort
View
CCS
2008
ACM
15 years 2 months ago
Computationally sound mechanized proofs for basic and public-key Kerberos
Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, J...
OOPSLA
2010
Springer
14 years 10 months ago
What can the GC compute efficiently?: a language for heap assertions at GC time
Christoph Reichenbach, Neil Immerman, Yannis Smara...
WISA
2010
Springer
14 years 10 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
117
Voted
CG
2006
Springer
15 years 21 days ago
Supporting content scheduling on situated public displays
There is increasing interest in creating networks of situated public displays that offer novel forms of interaction and rich media content
Oliver Storz, Adrian Friday, Nigel Davies
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
14 years 14 days ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas