Sciweavers

185 search results - page 4 / 37
» Efficiently computing private recommendations
Sort
View
EDBT
2009
ACM
145views Database» more  EDBT 2009»
13 years 10 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
CSREASAM
2006
13 years 8 months ago
An Efficient Bloom Filter Based Solution for Multiparty Private Matching
- The issue of privacy becomes more and more important. On the other hand, online collaboration among different parties is almost unavoidable. How to allow collaboration while prot...
Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. ...
APNOMS
2006
Springer
13 years 10 months ago
Mixing Heterogeneous Address Spaces in a Single Edge Network
The growth of IPv4 Internet has been facing the infamous IP address depletion barrier. In practice, typical IPv4 Internet edge networks can be expanded by incorporating private add...
Ilhwan Kim, Heon Young Yeom
FC
2009
Springer
84views Cryptology» more  FC 2009»
13 years 10 months ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersec...
Jan Camenisch, Gregory M. Zaverucha
PAIRING
2010
Springer
133views Cryptology» more  PAIRING 2010»
13 years 4 months ago
Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree
Scott uses an efficiently computable isomorphism in order to optimize pairing computation on a particular class of curves with embedding degree 2. He points out that pairing implem...
Sorina Ionica, Antoine Joux