• gmp

  • Referenced in 289 articles [sw00363]
  • cryptography applications and research, Internet security applications, algebra systems, computational algebra research...
  • Möbius

  • Referenced in 25 articles [sw04098]
  • reliability, availability, and performance of computer and network systems, its use has expanded rapidly ... effects of malicious attackers on secure computer systems, in addition to the original applications. That...
  • FairplayMP

  • Referenced in 15 articles [sw11926]
  • FairplayMP: a system for secure multi-party computation. We present FairplayMP (for ”Fairplay Multi-Party ... system for secure multi-party computation. Secure computation is one of the great achievements ... computation that emulates a trusted party which receives the inputs from the parties, computes ... FairplayMP supplements the Fairplay system [16], which supported secure computation between two parties. The underlying...
  • Sharemind

  • Referenced in 16 articles [sw22617]
  • Sharemind: A framework for fast privacy-preserving computations. Gathering and processing sensitive data ... present a provably secure and efficient general-purpose computation system to address this problem ... relies on share computing techniques. This is a standard way for securely evaluating functions...
  • NetSolve

  • Referenced in 50 articles [sw01978]
  • access to remote computational hardware and software resources. Since then, the system has benefitted from ... many enhancements like security services, data management faculties and distributed storage infrastructures. This article...
  • SCiFI

  • Referenced in 4 articles [sw33595]
  • identification. We introduce SCiFI, a system for Secure Computation of Face Identification. The system performs ... images in public places. The system runs a secure computation of a face recognition algorithm ... online latency. 3. A system - SCiFI, which implements a secure computation of the face identification ... entire system can run in near real-time: The secure computation protocol performs a preprocessing...
  • PassPoints

  • Referenced in 4 articles [sw30797]
  • longitudinal evaluation of a graphical password system. Computer security depends largely on passwords to authenticate ... passwords over time if they choose a secure password, i.e. a password that is long ... secure and memorable passwords. In this paper we describe PassPoints, a new and more secure ... graphical password system. We report an empirical study comparing the use of PassPoints to alphanumeric...
  • EasyCrypt

  • Referenced in 33 articles [sw09738]
  • Computer-aided security proofs for the working cryptographer. We present EasyCrypt, an automated tool ... elaborating security proofs of cryptographic systems from proof sketches-compact, formal representations of the essence...
  • TweetNaCl

  • Referenced in 2 articles [sw13115]
  • trusted code base of a secure computer system. This paper uses two examples of formally ... TweetNaCl’s cryptographic implementations meet the same security and reliability standards as NaCl: for example...
  • CIPRNG

  • Referenced in 2 articles [sw23608]
  • satisfy both physical and ubiquitous computing security system challenges. The main contribution of this paper...
  • Condor-G

  • Referenced in 49 articles [sw09651]
  • dramatic increase in the number of available computing and storage resources. Yet few tools exist ... aggregated form. We present the Condor-G system, which leverages software from Globus and Condor ... handles job management, resource selection, security, and fault tolerance. We also present results from application...
  • NVisionIP

  • Referenced in 4 articles [sw07393]
  • state for security situational awareness. The number of attacks against large computer systems is currently...
  • SNAP

  • Referenced in 19 articles [sw09647]
  • systems. A fundamental problem in distributed computing is to map activities such as computation ... resources that meet requirements for performance, cost, security, or other quality of service metrics...
  • G-Hadoop

  • Referenced in 12 articles [sw08480]
  • security framework in G-Hadoop for big data computing across distributed cloud data centres. MapReduce ... runs the MapReduce tasks on a cluster system. G-Hadoop is an extension ... single cluster. This work proposes a new security model for G-Hadoop. The security model...
  • LIFT

  • Referenced in 3 articles [sw20596]
  • Practical Information Flow Tracking System for Detecting Security Attacks. Computer security is severely threatened ... wide range of security attacks. However, current information flow tracking systems are not very practical...
  • CloudSim

  • Referenced in 28 articles [sw10724]
  • Infrastructures and Services. Cloud computing focuses on delivery of reliable, secure, fault-tolerant, sustainable ... energy performance (power consumption, heat dissipation), and system size is an extremely challenging problem ... modelling, simulation, and experimentation of emerging Cloud computing infrastructures and management services. The simulation framework...
  • UMLsec

  • Referenced in 3 articles [sw12754]
  • computer systems can cause considerable economic or physical damage. High-quality development of security-critical...
  • MINRES-QLP

  • Referenced in 28 articles [sw11181]
  • squares problems. If the system is singular, MINRES-QLP computes the unique minimum-length solution ... known to the solver but hidden and secure from other program units. In particular...
  • ConfiChair

  • Referenced in 7 articles [sw13266]
  • Cloud computing means entrusting data to information systems that are managed by external parties ... still allowing it to perform data-dependent computations. The technique is based on key translations ... particular cloud computing application of conference management. We identify the specific security and privacy risks ... that existing systems like EasyChair and EDAS pose, and address them with a protocol underlying...
  • TH-SMS

  • Referenced in 1 article [sw02437]
  • Security management system in advanced computational infrastructure...