Sciweavers

164 search results - page 14 / 33
» Covert two-party computation
Sort
View
PET
2007
Springer
14 years 3 months ago
Identity Trail: Covert Surveillance Using DNS
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...
Saikat Guha, Paul Francis
ICDM
2006
IEEE
169views Data Mining» more  ICDM 2006»
14 years 3 months ago
Privacy-Preserving Data Imputation
In this paper, we investigate privacy-preserving data imputation on distributed databases. We present a privacypreserving protocol for filling in missing values using a lazy deci...
Geetha Jagannathan, Rebecca N. Wright
STOC
2005
ACM
101views Algorithms» more  STOC 2005»
14 years 3 months ago
The round complexity of two-party random selection
We study the round complexity of two-party protocols for generating a random nbit string such that the output is guaranteed to have bounded bias (according to some measure) even i...
Saurabh Sanghvi, Salil P. Vadhan
CMMR
2007
Springer
161views Music» more  CMMR 2007»
14 years 4 months ago
NN Music: Improvising with a 'Living' Computer
A live algorithm describes an ideal autonomous performance system able to engage in performance with abilities analogous, if not identical, to a human musician. This paper proposes...
Michael Young
WPES
2003
ACM
14 years 3 months ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton