Sciweavers

741 search results - page 83 / 149
» Verification of security protocols using LOTOS-method and ap...
Sort
View
SAC
2005
ACM
15 years 9 months ago
SELS: a secure e-mail list service
Exchange of private information content among a large number of users via E-mail List Services is becoming increasingly common. In this paper we address security requirements in t...
Himanshu Khurana, Adam J. Slagell, Rafael Bonilla
WWW
2004
ACM
16 years 4 months ago
Adapting databases and WebDAV protocol
The ability of the Web to share data regardless of geographical location raises a new issue called remote authoring. With the Internet and Web browsers being independent of hardwa...
Bita Shadgar, Ian Holyer
EUROCRYPT
2004
Springer
15 years 7 months ago
Efficient Private Matching and Set Intersection
We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has m...
Michael J. Freedman, Kobbi Nissim, Benny Pinkas
CRYPTO
2010
Springer
181views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Due to its universality oblivious transfer (OT) is a primitive of great importance in secure multi-party computation. OT is impossible to implement from scratch in an unconditional...
Severin Winkler, Jürg Wullschleger
IJWIS
2007
153views more  IJWIS 2007»
15 years 3 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...