Sciweavers

164 search results - page 17 / 33
» Covert two-party computation
Sort
View
CCS
2006
ACM
14 years 1 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
TGC
2007
Springer
14 years 3 months ago
Multipoint Session Types for a Distributed Calculus
Session types are a means of statically encoding patterns of interaction between two communicating parties. This paper explores a distributed calculus with session types in which a...
Eduardo Bonelli, Adriana B. Compagnoni
ICSOC
2009
Springer
13 years 7 months ago
Flexible SLA Negotiation Using Semantic Annotations
Abstract. Moving towards a global market of services requires flexible infrastructures that will deal with the inevitable semantic heterogeneity that occurs during the negotiation ...
Henar Muñoz Frutos, Ioannis Kotsiopoulos, A...
ICDE
2009
IEEE
168views Database» more  ICDE 2009»
14 years 11 months ago
Privacy-Preserving Singular Value Decomposition
Abstract-- In this paper, we propose secure protocols to perform Singular Value Decomposition (SVD) for two parties over horizontally and vertically partitioned data. We propose va...
Shuguo Han, Wee Keong Ng, Philip S. Yu
DKE
2008
98views more  DKE 2008»
13 years 10 months ago
Privacy-preserving imputation of missing data
Handling missing data is a critical step to ensuring good results in data mining. Like most data mining algorithms, existing privacy-preserving data mining algorithms assume data ...
Geetha Jagannathan, Rebecca N. Wright