Sciweavers

6861 search results - page 155 / 1373
» Security for Ubiquitous Computing
Sort
View
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
15 years 10 months ago
Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive?
This article empirically examines the awareness, concern, and actions of home-based small business owners regarding Internet-based computer security risks. A scientific, Internet-...
David W. Johnson, Harold Koch
CRYPTO
2006
Springer
99views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Scalable Secure Multiparty Computation
We present the first general protocol for secure multiparty computation which is scalable, in the sense that the amortized work per player does not grow, and in some natural settin...
Ivan Damgård, Yuval Ishai
COMPUTER
2004
120views more  COMPUTER 2004»
15 years 4 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
CRYPTO
2006
Springer
232views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
Abstract. We introduce algebraic geometric techniques in secret sharing and in secure multi-party computation (MPC) in particular. The main result is a linear secret sharing scheme...
Hao Chen, Ronald Cramer