Sciweavers

310 search results - page 10 / 62
» An Efficient Protocol for Fair Secure Two-Party Computation
Sort
View
FC
2005
Springer
120views Cryptology» more  FC 2005»
14 years 2 months ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah
NCA
2011
IEEE
13 years 3 months ago
Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data
—Neural Networks have been an active research area for decades. However, privacy bothers many when the training dataset for the neural networks is distributed between two parties...
Ankur Bansal, Tingting Chen, Sheng Zhong
ISI
2005
Springer
14 years 2 months ago
Private Mining of Association Rules
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Justin Z. Zhan, Stan Matwin, LiWu Chang
ACSAC
1999
IEEE
14 years 26 days ago
Modular Fair Exchange Protocols for Electronic Commerce
Recently, research has focused on enabling fair exchange between payment and electronically shipped items. The reason for this is the growing importance of Electronic Commerce and...
Holger Vogt, Henning Pagnia, Felix C. Gärtner
SP
1996
IEEE
118views Security Privacy» more  SP 1996»
14 years 21 days ago
A Fair Non-repudiation Protocol
: This paper examines the Zhou-Gollmann fair non-repudiation protocol as well as its modified version of Kim et al. We describe how these protocols are vulnerable to an attack by a...
Jianying Zhou, Dieter Gollmann