Filters








204,083 Hits in 8.5 sec

Completeness in Two-Party Secure Computation: A Computational View

Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen
<span title="2006-05-24">2006</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jmi32x7o5hfnpkgh2irnuqpim" style="color: black;">Journal of Cryptology</a> </i> &nbsp;
A Secure Function Evaluation (SFE) of a two-variable function f (·, ·) is a protocol that allows two parties with inputs x and y to evaluate f (x, y) in a manner where neither party learns "more than is  ...  A rich body of work deals with the study of completeness for secure twoparty computation.  ...  Note that an implementation of OT was shown to guarantee secure computation for further computational models such as multi-party secure computation [21] (as opposed to two parties), symmetric versions  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-006-0346-4">doi:10.1007/s00145-006-0346-4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/boh2dwcg7bajfjg352a7m56zje">fatcat:boh2dwcg7bajfjg352a7m56zje</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170923003147/https://eccc.weizmann.ac.il/report/2003/060/download/" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/da/d0/dad024cf72de592e965559b5e22c7048587a3bff.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-006-0346-4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Completeness in two-party secure computation

Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen
<span title="">2004</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jlc5kugafjg4dl7ozagimqfcbm" style="color: black;">Proceedings of the thirty-sixth annual ACM symposium on Theory of computing - STOC &#39;04</a> </i> &nbsp;
A Secure Function Evaluation (SFE) of a two-variable function f (·, ·) is a protocol that allows two parties with inputs x and y to evaluate f (x, y) in a manner where neither party learns "more than is  ...  A rich body of work deals with the study of completeness for secure twoparty computation.  ...  Note that an implementation of OT was shown to guarantee secure computation for further computational models such as multi-party secure computation [21] (as opposed to two parties), symmetric versions  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1007352.1007395">doi:10.1145/1007352.1007395</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/stoc/HarnikNRR04.html">dblp:conf/stoc/HarnikNRR04</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ufh7bww36vf3znsk5h43e4zkqi">fatcat:ufh7bww36vf3znsk5h43e4zkqi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170923003147/https://eccc.weizmann.ac.il/report/2003/060/download/" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/da/d0/dad024cf72de592e965559b5e22c7048587a3bff.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1007352.1007395"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Complete fairness in secure two-party computation

Dov S. Gordon, Hazay Carmit, Jonathan Katz, Yehuda Lindell
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jlc5kugafjg4dl7ozagimqfcbm" style="color: black;">Proceedings of the fourtieth annual ACM symposium on Theory of computing - STOC 08</a> </i> &nbsp;
complete for two-party secure computation (with abort) [25] .  ...  In the setting of secure two-party computation, two mutually distrusting parties wish to compute some function of their inputs while preserving, to the extent possible, various security properties such  ...  Secure Two-Party Computation with Complete Fairness In what follows, we define what we mean by a secure protocol.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1374376.1374436">doi:10.1145/1374376.1374436</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/stoc/GordonHKL08.html">dblp:conf/stoc/GordonHKL08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fnw56oemrjgkvotosk4jimizde">fatcat:fnw56oemrjgkvotosk4jimizde</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120507224916/http://eprint.iacr.org/2008/303.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1e/a3/1ea32bde9e0f0fb256c911895c03dd56333508f6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1374376.1374436"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Complete Fairness in Secure Two-Party Computation

S. Dov Gordon, Carmit Hazay, Jonathan Katz, Yehuda Lindell
<span title="2011-12-01">2011</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/r72grtxx6jad5hjzl7fxcunwhi" style="color: black;">Journal of the ACM</a> </i> &nbsp;
complete for two-party secure computation (with abort) [25] .  ...  In the setting of secure two-party computation, two mutually distrusting parties wish to compute some function of their inputs while preserving, to the extent possible, various security properties such  ...  Secure Two-Party Computation with Complete Fairness In what follows, we define what we mean by a secure protocol.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2049697.2049698">doi:10.1145/2049697.2049698</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wyi6ldh6nrfc7dh3p7d3xnwx6u">fatcat:wyi6ldh6nrfc7dh3p7d3xnwx6u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120507224916/http://eprint.iacr.org/2008/303.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1e/a3/1ea32bde9e0f0fb256c911895c03dd56333508f6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2049697.2049698"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Towards Characterizing Complete Fairness in Secure Two-Party Computation [chapter]

Gilad Asharov
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This raises the fundamental question of characterizing complete fairness in secure two-party computation.  ...  Since then, the accepted belief has been that nothing non-trivial can be computed with complete fairness in the two party setting.  ...  vector X x,a ideal for which: X x,a ideal · M f = Q x,a , then the protocol securely computes f with complete fairness.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-54242-8_13">doi:10.1007/978-3-642-54242-8_13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gepsycxbpjcxbdxl5q6asjnwpu">fatcat:gepsycxbpjcxbdxl5q6asjnwpu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190502205500/https://link.springer.com/content/pdf/10.1007%2F978-3-642-54242-8_13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b8/1e/b81ea0b420fd73d5c25e9d02d769f9056d7937f9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-54242-8_13"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions [chapter]

Gilad Asharov, Amos Beimel, Nikolaos Makriyannis, Eran Omri
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Fairness is a desirable property in secure computation; informally it means that if one party gets the output of the function, then all parties get the output.  ...  Our main result in this work is a complete characterization of the ( symmetric) Boolean functions that can be computed with fairness in the two-party setting; this settles an open problem of Gordon et  ...  Our main result in this work is a complete characterization of the Boolean function that can be computed with full security in the two-party setting. This solves an open problem of [10] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_10">doi:10.1007/978-3-662-46494-6_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bbt3g64ffndsnbtoz57gosjmca">fatcat:bbt3g64ffndsnbtoz57gosjmca</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160310093952/http://eprint.iacr.org/2014/1000.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/c3/d5c3d39d364078c1cbf2eed206a3cccf9bbb33a8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A View Of Cloud Computing

Juhnyoung Lee
<span title="">2013</span> <i title="Atlantis Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mitejrukingkdiyzijpbo7msre" style="color: black;">International Journal of Networked and Distributed Computing (IJNDC)</a> </i> &nbsp;
It is a natural evolution of the widespread adoption of multiple technical advances in the distributed computing area including virtualization, grid computing, autonomic computing, utility computing and  ...  This paper presents several views on different perspectives of Cloud Computing, including technical advancement, IT delivery and deployment modes, and economics.  ...  A Technical View Cloud computing is a natural evolution of the widespread adoption of multiple technical advances in distributed computing including virtualization, grid computing, autonomic computing,  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2991/ijndc.2013.1.1.2">doi:10.2991/ijndc.2013.1.1.2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lqkgu55jnrezdpmq7m45zlie74">fatcat:lqkgu55jnrezdpmq7m45zlie74</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180725214342/https://download.atlantis-press.com/article/4425/pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/db/a4/dba46ff18ed8e96497ebe197611536a8128e7386.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2991/ijndc.2013.1.1.2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Towards a Game Theoretic View of Secure Computation [chapter]

Gilad Asharov, Ran Canetti, Carmit Hazay
<span title="">2011</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In the restricted but indicative case of two-party protocols in the face of malicious fail-stop faults, we first show how the traditional notions of secrecy and correctness of protocols can be captured  ...  Here we demonstrate a Game Theoretic notion and two different cryptographic notions that turn out to all be equivalent.  ...  Let π be a two-party protocol computing a function f .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-20465-4_24">doi:10.1007/978-3-642-20465-4_24</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wrloku7wbng4bcnjjnobvguilq">fatcat:wrloku7wbng4bcnjjnobvguilq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151122094311/http://www.eng.biu.ac.il/~hazay/Journals/GameTheory.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f7/f2/f7f231f25b68cad41b167324a6035ae4d7d3e898.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-20465-4_24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Toward a Game Theoretic View of Secure Computation

Gilad Asharov, Ran Canetti, Carmit Hazay
<span title="2015-08-14">2015</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jmi32x7o5hfnpkgh2irnuqpim" style="color: black;">Journal of Cryptology</a> </i> &nbsp;
Here we demonstrate a Game Theoretic notion and two different cryptographic notions that turn out to all be equivalent.  ...  In addition, we provide a simulation-based notion that implies the previous three. All four notions are weaker than existing cryptographic notions of fairness.  ...  Let π be a two-party protocol computing a function f .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-015-9212-6">doi:10.1007/s00145-015-9212-6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2a2im4xaijafpoeadm6wuefp2i">fatcat:2a2im4xaijafpoeadm6wuefp2i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200711182607/https://link.springer.com/content/pdf/10.1007%2Fs00145-015-9212-6.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3c/7b/3c7b6eaace85c41c614041f9e7b534a71f4f8633.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-015-9212-6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

High-Performance Cloud Computing: A View of Scientific Applications

Christian Vecchiola, Suraj Pandey, Rajkumar Buyya
<span title="">2009</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/siul7ujtmvhtzphmpwdz6fwtgy" style="color: black;">2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks</a> </i> &nbsp;
Cloud computing provides scientists with a completely new model of utilizing the computing infrastructure.  ...  As examples of scientific computing in the Cloud, we present a preliminary case study on using Aneka for the classification of gene expression data and the execution of fMRI brain imaging workflow.  ...  They have been very helpful in sketching the overall design of the classifier and precious in analyzing the results.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/i-span.2009.150">doi:10.1109/i-span.2009.150</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ispan/VecchiolaPB09.html">dblp:conf/ispan/VecchiolaPB09</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4lqxxscptvey7og3pxumtqfege">fatcat:4lqxxscptvey7og3pxumtqfege</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100920173417/http://chinacloud.cn/upload/2010-02/10022816242162.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/87/89/8789dd1447b288159b154cc7bf7861b308f1013c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/i-span.2009.150"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A micro-ethical view on computing practice

Peter Bittner, Eva Hornecker
<span title="">2005</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fu24z4ytv5fdtbblaxawbk2d64" style="color: black;">Proceedings of the 4th decennial conference on Critical computing between sense and sensibility - CC &#39;05</a> </i> &nbsp;
Critical computing should include a concern for the everyday work practice of IT professionals.  ...  We finish with related research questions relevant for this micro-ethical view that offer a broad field for research, as well as for professional action.  ...  delicate and tricky topic in such an impressive way.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1094562.1094571">doi:10.1145/1094562.1094571</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/critical/BittnerH05.html">dblp:conf/critical/BittnerH05</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cq6fct3c2jgc3abxlhj4uiccky">fatcat:cq6fct3c2jgc3abxlhj4uiccky</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809053636/http://www.cs.potsdam.edu/faculty/laddbc/Teaching/Ethics/StudentPapers/2005Bittner-Micro-ethicalViewOnComputingPractice.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/de/4e/de4ef29d643c8b1f047370aecc6726538134147f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1094562.1094571"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A Modern View on Forward Security

Colin Boyd, Kai Gellert
<span title="2020-08-24">2020</span> <i title="Oxford University Press (OUP)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bf4qaipmsrghrjyxonrsmqevie" style="color: black;">Computer journal</a> </i> &nbsp;
Such a form of security is regarded as increasingly important in the modern world due to the existence of adversaries with mass storage capabilities and powerful infiltration abilities.  ...  Forward security ensures that compromise of entities today does not impact the security of cryptographic primitives employed in the past.  ...  FIGURE 4 . 4 Key exchange with pre-computed keys. Section D: Security in Computer Systems and Networks The Computer Journal, Vol. 00 No. 0, 2020 A Modern View on Forward Security 3 FIGURE 1.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxaa104">doi:10.1093/comjnl/bxaa104</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4rmqca3iabh2plsmjif7ai25je">fatcat:4rmqca3iabh2plsmjif7ai25je</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210715054041/https://ntnuopen.ntnu.no/ntnu-xmlui/bitstream/handle/11250/2730309/bxaa104.pdf?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d7/3e/d73e6aa61d5030cb7011b2f747c60d00f300e9b9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxaa104"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> oup.com </button> </a>

Cloud Programming Simplified: A Berkeley View on Serverless Computing [article]

Eric Jonas, Johann Schleier-Smith, Vikram Sreekanti, Chia-Che Tsai, Anurag Khandelwal, Qifan Pu, Vaishaal Shankar, Joao Carreira, Karl Krauth, Neeraja Yadwadkar, Joseph E. Gonzalez, Raluca Ada Popa, Ion Stoica, David A. Patterson
<span title="2019-02-09">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This paper gives a quick history of cloud computing, including an accounting of the predictions of the 2009 Berkeley View of Cloud Computing paper, explains the motivation for serverless computing, describes  ...  will grow to dominate the future of cloud computing.  ...  In our view, these services are domain-specific, highly optimized implementations of serverless computing. Cloud functions represent serverless computing in a more general form.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1902.03383v1">arXiv:1902.03383v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5lly4vckcnhatp4g3ccdt3us6e">fatcat:5lly4vckcnhatp4g3ccdt3us6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200913232435/https://arxiv.org/pdf/1902.03383v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d6/6a/d66a589e919ffac657b4fbf11caee5a5f20de787.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1902.03383v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Toward a Broader View of Security Protocols [chapter]

Matt Blaze
<span title="">2006</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Computer and network security researchers usually focus on the security of computers and networks.  ...  We miss important insights from, and opportunities to make contributions to, a larger world that has been grappling with security since long before the computer was invented.  ...  Such taxonomies would be useful for analysis of both human-and computer-based systems (and especially systems based on a combination of the two) in a coherent, more uniform manner.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11861386_12">doi:10.1007/11861386_12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4hbupmatfnb2vcjgcjjq5dt4dm">fatcat:4hbupmatfnb2vcjgcjjq5dt4dm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20070203134623/http://dimacs.rutgers.edu:80/Workshops/Tools/slides/blaze.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2b/63/2b6346209719d21e7205c2c819a5d257eb5c2f9c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11861386_12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

The ASW Protocol Revisited: A Unified View

Paul Hankes Drielsma, Sebastian Mödersheim
<span title="">2005</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uy5mv2ncw5eahkdx47hkrglxmm" style="color: black;">Electronical Notes in Theoretical Computer Science</a> </i> &nbsp;
We revisit the analysis of the ASW contract signing protocol and use a unified view of the protocol as a whole as a basis to reason about the protocol and its objectives.  ...  This line of reasoning yields a simpler and clearer model of agents and protocol objectives which is within the scope of standard security analysis methods, as it does not require fairness constraints  ...  The former involves only the two protocol participants, the originator O and the responder R, while the latter two are only executed if the trusted third party T is called upon to resolve a dispute.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.entcs.2004.05.024">doi:10.1016/j.entcs.2004.05.024</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ptrhiayrsbbxrjhnqoujfxzuie">fatcat:ptrhiayrsbbxrjhnqoujfxzuie</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171001041128/http://publisher-connector.core.ac.uk/resourcesync/data/elsevier/pdf/9c2/aHR0cDovL2FwaS5lbHNldmllci5jb20vY29udGVudC9hcnRpY2xlL3BpaS9zMTU3MTA2NjEwNTAwMDc5NA%3D%3D.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/01/5f/015f44dddb537078e05c6fd1a6cd0c899feb57bd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.entcs.2004.05.024"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 204,083 results