Sciweavers

5484 search results - page 63 / 1097
» Almost-Everywhere Secure Computation
Sort
View
99
Voted
FCT
2005
Springer
15 years 9 months ago
A Type System for Computationally Secure Information Flow
Peeter Laud, Varmo Vene
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 9 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
90
Voted
IEEESP
2010
91views more  IEEESP 2010»
15 years 27 days ago
Security and Privacy Challenges in Cloud Computing Environments
Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn
128
Voted
FC
2005
Springer
83views Cryptology» more  FC 2005»
15 years 9 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
15 years 7 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa