Sciweavers

96 search results - page 8 / 20
» Covert Multi-Party Computation
Sort
View
STOC
2005
ACM
112views Algorithms» more  STOC 2005»
14 years 7 months ago
Covert two-party computation
We introduce the novel concept of covert two-party computation. Whereas ordinary secure two-party computation only guarantees that no more knowledge is leaked about the inputs of t...
Luis von Ahn, Nicholas J. Hopper, John Langford
CRYPTO
2008
Springer
165views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
Payman Mohassel, Enav Weinreb
CORR
2008
Springer
116views Education» more  CORR 2008»
13 years 7 months ago
A computational approach to the covert and overt deployment of spatial attention
Popular computational models of visual attention tend to neglect the influence of saccadic eye movements whereas it has been shown that the primates perform on average three of th...
Jérémy Fix, Nicolas P. Rougier, Fr&e...
IH
2004
Springer
14 years 22 days ago
Covert Channels for Collusion in Online Computer Games
Steven J. Murdoch, Piotr Zielinski
ICON
2007
IEEE
14 years 1 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...