Sciweavers

6861 search results - page 134 / 1373
» Security for Ubiquitous Computing
Sort
View
TCC
2005
Springer
88views Cryptology» more  TCC 2005»
15 years 9 months ago
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation
Definition of security under the framework of Environmental Security (a.k.a Network-Aware Security or Universally Composable Security) typically requires “extractability” of t...
Manoj Prabhakaran, Amit Sahai
FGCN
2008
IEEE
152views Communications» more  FGCN 2008»
15 years 5 months ago
Extending the UbiMDR Supporting Situation-Aware Access Control
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related...
Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik
DAGSTUHL
2007
15 years 5 months ago
Software Development Support for Ambient Assisted Living
Key issues in software development support for Ambient Intelligence and Ubiquitous Computing are briefly discussed; special requirements in the context of Ambient Assisted Living a...
Max Mühlhäuser
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
16 years 4 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
161
Voted
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi