Filters








84,768 Hits in 3.3 sec

Universal Composability is Secure Compilation [article]

Marco Patrignani, Riad S. Wahby, Robert Künnemann
2020 arXiv   pre-print
We believe this is the first step towards understanding how can secure compilation theories be used in universal composability settings and vice-versa.  ...  This paper outlines the connection between universal composability and robust compilation, the latest of secure compilation theories.  ...  Universal Composability We begin by briefly sketching how the UC framework is used.  ... 
arXiv:1910.08634v2 fatcat:pedvgaujufhali2tix7l67y4ta

A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer [chapter]

Shota Goto, Junji Shikata
2015 Lecture Notes in Computer Science  
The contribution of this paper is the following: (i) We propose a compiler of two-party protocols in the local universal composability (LUC) framework such that it transforms any two-party protocol secure  ...  In order to discuss the composability of game-theoretic properties, we study security of cryptographic protocols in terms of the universal composability (UC) and game theory simultaneously.  ...  This work was partially supported by JSPS KAKENHI Grant Number 15H02710, and it was partially conducted under the auspices of the MEXT Program for Promoting the Reform of National Universities.  ... 
doi:10.1007/978-3-319-27239-9_8 fatcat:xdj34aqm4nh7nohlowpm5iyoou

Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042)

Jan Camenisch, Ralf Küsters, Anna Lysyanskaya, Alessandra Scafuro, Michael Wagner
2019 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 19042 "Practical Yet Composably Secure Cryptographic Protocols".  ...  protocols in such a model; (3) how to prove security of protocols in such a model.  ...  The universal composability (UC) framework guarantees that a protocol remains secure even when composed with arbitrary other protocols.  ... 
doi:10.4230/dagrep.9.1.88 dblp:journals/dagstuhl-reports/CamenischKLS19 fatcat:j2dfgtcoxnbvtgpu7mtxdehequ

Page 200 of California University Chronicle Vol. 8, Issue 2 [page]

1905 California University Chronicle  
was obliged to cancel a number of other engagements for the more important purpose of securing information at this meeting on matters of interest to the University.  ...  As the Academie Senate is composed of all holding the title of Professor, Associate Professor, Assistant Professor and Instructor, together with those holding other titles of equivalent rank, this catalogue  ... 

Development of a surveillance system

Giovana La Luna, Henrique Cândido de Oliveira
2019 Revista dos Trabalhos de Iniciação Científica da UNICAMP  
Analyzing the history of violence in Brazil, and considering such episodes within the universities, as well as within the Unicamp (State University of Campinas), an effective security system is needed,  ...  compilation , analysis and management in a database.  ...  This software consists of a Geographic Information System (GIS) that assimilates reference data in an environment of response to setbacks; it provides what is needed for map creation, spatial data compilation  ... 
doi:10.20396/revpibic262018529 fatcat:nb7ixncemjab7hrqhovumjpxcq

How to Compute in the Presence of Leakage

Shafi Goldwasser, Guy N. Rothblum
2012 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science  
Our main result is a compiler, which takes as input an algorithm P and a security parameter κ, and produces a functionally equivalent algorithm P .  ...  This result is unconditional and does not rely on any secure hardware components.  ...  Put together, this yields a compiler that is secure against continual OC leakage attacks. A.  ... 
doi:10.1109/focs.2012.34 dblp:conf/focs/GoldwasserR12 fatcat:usojouaaczd6jcgwiuchscfewi

Application-Aware Reliability and Security: The Trusted ILLIAC Approach

R.K. Iyer
2006 Fifth IEEE International Symposium on Network Computing and Applications (NCA'06)  
Trusted ILLIAC 1 is a reliable and secure clustercomputing platform being built ments.  ...  The challenge is to provide an application-specific level of reliability and security in a totally transparent manner, while delivering optimal performance.  ...  University of Illinois. involving reprogrammable hardware, enhanced compiler methods to extract security and reliability properties, and the support of configurable operating system and middleware.  ... 
doi:10.1109/nca.2006.15 dblp:conf/nca/Iyer06 fatcat:urnd57ua3napnob2majgpomx7i

Universally Composable Secure Mobile Agent Computation [chapter]

Ke Xu, Stephen R. Tate
2004 Lecture Notes in Computer Science  
We define universally composable security for mobile agent computation that is geared toward a complex networking environment where arbitrary protocol instances may be executing concurrently.  ...  Finally, under the assumption of a universally composable threshold cryptosystem, we present universally composable, multi-agent protocols with provable security against either static, semi-honest or static  ...  Mobile Agents with Static, Malicious Adversaries For security against arbitrary malicious attacks, we apply the universally composable compiler presented in [10] to Protocol 2.  ... 
doi:10.1007/978-3-540-30144-8_26 fatcat:jvvzt2xfizhp7nxz6iko6qzkl4

Page 391 of Maryland Historian Vol. 20, Issue 4 [page]

1925 Maryland Historian  
Metcalf has been gathering materials relating to the development of Church music in America and has published a number of biographical and critical articles on the writers, composers and compilers of hymns  ...  University of California Press, 1925. $4.50.  ... 

Security Evaluation and Hardening of Free and Open Source Software (FOSS)

Robert Charpentier, Mourad Debbabi, Dima Alhadidi, Azzam Mourad, Nadia Belblidia, Amine Boukhtouta, Aiman Hanna, Rachid Hadjidj, Hakim Kaitouni, Marc-André Laverdière, Hai Zhou Ling, Syrine Tlili (+2 others)
2010 Electronic Communications of the EASST  
A DRDC Valcartier-Concordia University feasibility study completed in March 2004 concluded that the most promising approach for securing FOSS is to combine advanced design patterns and Aspect-Oriented  ...  However, the secure integration of FOSS in IT infrastructures is very challenging and demanding.  ...  This compiler, which has weaving capabilities, is an extension to the GCC compiler version 4.2.0.  ... 
doi:10.14279/tuj.eceasst.33.452 dblp:journals/eceasst/CharpentierDAMBBHHKLLTYY10 fatcat:3fesbfk6anhpbgfiqcugacfg2e

Page 640 of School Science and Mathematics Vol. 44, Issue 387 [page]

1944 School Science and Mathematics  
A guarantee is made that the opinions will not be compiled nor the comments read until the students’ final grades in the course 1 Acknowledgment is made to Dr. A. W. Stewart, Dr. W. L.  ...  the writer has made it a practice to secure student appraisal of his courses at the end of each term.  ... 

Page 53 of Law Library Journal Vol. 33, Issue 2 [page]

1940 Law Library Journal  
CURRENT COMMENTS 53 Iowa, compiler of the index. The Handbook may be secured without charge on application to the National Conference of Judicial Councils, 744 Broad Street, Newark, N. J.  ...  The Joint COMMITTEE ON CLASSIFICATION AND Pay PLANs, recommended by the American Association of Law Libraries and also authorized at the 1939 meet- ing of the Association of American Law Schools, is composed  ... 

Page 257 of Soundings Vol. 11, Issue 4 [page]

1928 Soundings  
Acting upon the authority thus granted, the Board of Education of the Church appointed a Commission on Higher Education, composed of eight members, charged with securing the survey staff and with making  ...  Information has been sought and is being compiled concerning the organization and operation of supporting Synods and Ministeriums, concern- ing other organizations which support or assist the colleges,  ... 

Page 257 of Soundings Vol. 11, Issue 4 [page]

1928 Soundings  
Acting upon the authority thus granted, the Board of Education of the Church appointed a Commission on Higher Education, composed of eight members, charged with securing the survey staff and with making  ...  Information has been sought and is being compiled concerning the organization and operation of supporting Synods and Ministeriums, concern- ing other organizations which support or assist the colleges,  ... 

Secure Multi-Party Computation without Agreement

Shafi Goldwasser, Yehuda Lindell
2005 Journal of Cryptology  
In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort.  ...  In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted.  ...  Universally Composable Broadcast In this section, we consider the problem of achieving secure broadcast in the framework of universal composability.  ... 
doi:10.1007/s00145-005-0319-z fatcat:i2narlrnsjahplxte6po2wo4by
« Previous Showing results 1 — 15 out of 84,768 results