Sciweavers

436 search results - page 43 / 88
» Using trust assumptions with security requirements
Sort
View
TRUSTBUS
2007
Springer
15 years 10 months ago
Recognition of Authority in Virtual Organisations
Abstract. A Virtual Organisation (VO) is a temporary alliance of autonomous, diverse, and geographically dispersed organisations, where the participants pool resources, information...
Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser
143
Voted
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
15 years 8 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz
142
Voted
ISSA
2004
15 years 5 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
15 years 9 months ago
Round-Optimal Secure Two-Party Computation
Abstract. We consider the central cryptographic task of secure twoparty computation, where two parties wish to compute some function of their private inputs (each receiving possibl...
Jonathan Katz, Rafail Ostrovsky