Sciweavers

621 search results - page 14 / 125
» Efficient Secure Multi-party Computation
Sort
View
ASIACRYPT
2003
Springer
14 years 1 months ago
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. F...
Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
ATVA
2006
Springer
106views Hardware» more  ATVA 2006»
14 years 1 months ago
Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate Chains
Motivated by recent applications of pushdown systems to computer security problems, we present an efficient algorithm for the reachability problem of alternating pushdown systems. ...
Dejvuth Suwimonteerabuth, Stefan Schwoon, Javier E...
SP
2002
IEEE
144views Security Privacy» more  SP 2002»
13 years 9 months ago
ARMS: An agent-based resource management system for grid computing
provide a scalable and adaptable abstraction of the system architecture. Each agent is able to cooperate with other agents and thereby provide service advertisement and discovery f...
Junwei Cao, Stephen A. Jarvis, Subhash Saini
ICASSP
2011
IEEE
13 years 1 months ago
Efficiently computing private recommendations
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused ...
Zekeriya Erkin, M. Beye, T. Veugen, Reginald L. La...
CTRSA
2006
Springer
107views Cryptology» more  CTRSA 2006»
14 years 1 months ago
A Round and Communication Efficient Secure Ranking Protocol
In this work, we initiate the study of realizing a ranking functionality (m1,
Shaoquan Jiang, Guang Gong