Sciweavers

100 search results - page 10 / 20
» Asynchronous Secure Multiparty Computation in Constant Time
Sort
View
ASIACRYPT
2004
Springer
14 years 2 months ago
Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract)
d abstract) Bartosz Przydatek1 and Reto Strobl2 1 Department of Computer Science, ETH Z¨urich, Switzerland 2 IBM Research, Zurich Research Laboratory, Switzerland In this paper, w...
Bartosz Przydatek, Reto Strobl
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
14 years 14 days ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
COMCOM
2011
13 years 3 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
NIXDORF
1992
127views Hardware» more  NIXDORF 1992»
14 years 20 days ago
Three non Conventional Paradigms of Parallel Computation
Abstract. We consider three paradigms of computation where the bene ts of a parallel solution are greater than usual. Paradigm 1 works on a time-varying input data set, whose size ...
Fabrizio Luccio, Linda Pagli, Geppino Pucci