Sciweavers

3395 search results - page 77 / 679
» Computational Differential Privacy
Sort
View
ASIACRYPT
2005
Springer
14 years 4 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
ACSAC
1999
IEEE
14 years 3 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer
CCS
2009
ACM
13 years 9 months ago
RFID privacy: relation between two notions, minimal condition, and efficient construction
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions: one based on the indistinguishability of t...
Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li
ISSAC
2005
Springer
141views Mathematics» more  ISSAC 2005»
14 years 4 months ago
Algebraic general solutions of algebraic ordinary differential equations
In this paper, we give a necessary and sufficient condition for an algebraic ODE to have an algebraic general solution. For an autonomous first order ODE, we give an optimized bo...
J. M. Aroca, J. Cano, Ruyong Feng, Xiao-Shan Gao
HYBRID
2000
Springer
14 years 2 months ago
Verification of Hybrid Systems with Linear Differential Inclusions Using Ellipsoidal Approximations
A general verification algorithm is described. It is then shown how ellipsoidal methods developed by A. B. Kurzhanski and P. Varaiya can be adapted to the algorithm. New numerical ...
Oleg Botchkarev, Stavros Tripakis