Sciweavers

472 search results - page 67 / 95
» A Software-Optimized Encryption Algorithm
Sort
View
USS
2008
14 years 5 days ago
Coercion-Resistant Tallying for STV Voting
There are many advantages to voting schemes in which voters rank all candidates in order, rather than just choosing their favourite. However, these schemes inherently suffer from ...
Vanessa Teague, Kim Ramchen, Lee Naish
CCS
2010
ACM
13 years 10 months ago
User-friendly matching protocol for online social networks
In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in use...
Qiang Tang
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 10 months ago
Privacy-Preserving Protocols for Eigenvector Computation
Abstract. In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy const...
Manas A. Pathak, Bhiksha Raj
DCC
2000
IEEE
13 years 9 months ago
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes
Due to the success of differential and linear attacks on a large number of encryption algorithms, it is importanttoinvestigaterelationshipsamongvariouscryptographic, includingdiffe...
Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
GIS
2010
ACM
13 years 8 months ago
INTACT: a spatial query integrity assurance framework for location-based services
It is cost-effective for data owners to publicize their spatial databases via database outsourcing; however, data privacy and query integrity are major challenges. In this demonst...
Chih-Jye Wang, Wei-Shinn Ku, Ling Hu, Cyrus Shahab...