More efficient secure function evaluation using tiny trusted third parties
A Iliev, S Smith - 2005 - digitalcommons.dartmouth.edu
Abstract Secure Function Evaluation (SFE) problems. We assume that a really trustworthy
TTP device will have very limited protected memory and computation environment---a\emph …
TTP device will have very limited protected memory and computation environment---a\emph …
Accountable administration in operating systems
Many security models and systems are based on the assumption that super users must be
trusted. It is difficult to hold super users accountable because they can erase any logs of …
trusted. It is difficult to hold super users accountable because they can erase any logs of …
Towards multilaterally secure computing platforms—with open source and trusted computing
AR Sadeghi, C Stüble - Information Security Technical Report, 2005 - Elsevier
We present a security architecture for a trustworthy open computing platform that aims at
solving a variety of security problems of conventional platforms by an efficient migration of …
solving a variety of security problems of conventional platforms by an efficient migration of …
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying
the running processes and binding them to the corresponding executable applications. In …
the running processes and binding them to the corresponding executable applications. In …
[PDF][PDF] Broadcast Encryption Using Probabilistic Key Distribution and Applications.
M Ramkumar - J. Comput., 2006 - jcomputers.us
A family of novel broadcast encryption schemes based on probabilistic key pre-distribution
are proposed, that enable multiple sources to broadcast secrets, without the use of …
are proposed, that enable multiple sources to broadcast secrets, without the use of …
An efficient algorithm for resource sharing in peer-to-peer networks
WC Liao, F Papadopoulos, K Psounis - … , May 15-19, 2006. Proceedings 5, 2006 - Springer
The performance of peer-to-peer systems depends on the level of cooperation of the
system's participants. While most existing peer-to-peer architectures have assumed that …
system's participants. While most existing peer-to-peer architectures have assumed that …