This position paper discusses the problem of evaluating a function on an untrusted host, while maintaining the confidentiality of the function. A new non-interactive protocol designed to evaluate a function on an untrusted host is presented. The protocol prevents the disclosure of the function under cryptographic assumptions
The problem of protecting mobile code from both denial-of-service and state tampering attacks by mal...
Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile...
Abstract. Recent work has shown that several cryptographic protocols for the protection of free-roam...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a...
We propose an approach to support confidentiality for mobile implementations of security-sensitive p...
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional...
Abstract. This paper describes security protocols that use anonymous channels as primitive, much in ...
An increasingly promising and widespread topic of research in distributed computing is the mobile ag...
Among various computational models to accommodate the mobile wireless computing paradigm, the mobile...
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage c...
Abstract: Cachin et al. and Algesheimer et al. proposed schemes using secure function evaluation for...
Cachin et al. and Algesheimer et al. proposed schemes using secure function evaluation for protectin...
The mobile agent technology is a new paradigm of distributed computing that can replace the conventi...
The problem of protecting mobile code from both denial-of-service and state tampering attacks by mal...
Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile...
Abstract. Recent work has shown that several cryptographic protocols for the protection of free-roam...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a...
We propose an approach to support confidentiality for mobile implementations of security-sensitive p...
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional...
Abstract. This paper describes security protocols that use anonymous channels as primitive, much in ...
An increasingly promising and widespread topic of research in distributed computing is the mobile ag...
Among various computational models to accommodate the mobile wireless computing paradigm, the mobile...
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage c...
Abstract: Cachin et al. and Algesheimer et al. proposed schemes using secure function evaluation for...
Cachin et al. and Algesheimer et al. proposed schemes using secure function evaluation for protectin...
The mobile agent technology is a new paradigm of distributed computing that can replace the conventi...
The problem of protecting mobile code from both denial-of-service and state tampering attacks by mal...
Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile...
Abstract. Recent work has shown that several cryptographic protocols for the protection of free-roam...