Sciweavers

621 search results - page 78 / 125
» Efficient Secure Multi-party Computation
Sort
View
AGENTS
1997
Springer
14 years 3 months ago
Software Agents and User Autonomy
: Software agents comprise a new area for research and soon will be embedded and ubiquitous in modern computing systems. In this formative phase, it is important to develop compreh...
Batya Friedman, Helen Nissenbaum
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
13 years 8 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
AMW
2010
14 years 14 days ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
ASIACRYPT
2008
Springer
14 years 1 months ago
Universally Composable Adaptive Oblivious Transfer
In an oblivious transfer (OT) protocol, a Sender with messages M1, . . . , MN and a Receiver with indices 1, . . . , k [1, N] interact in such a way that at the end the Receiver ...
Matthew Green, Susan Hohenberger
ICDE
2009
IEEE
255views Database» more  ICDE 2009»
15 years 22 days ago
Database Management as a Service: Challenges and Opportunities
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...