Sciweavers

80 search results - page 15 / 16
» General Secure Multi-party Computation from any Linear Secre...
Sort
View
CCS
2001
ACM
13 years 11 months ago
A verifiable secret shuffle and its application to e-voting
We present a mathematical construct which provides a cryptographic protocol to verifiably shuffle a sequence of k modular integers, and discuss its application to secure, universa...
C. Andrew Neff
CVPR
2012
IEEE
11 years 10 months ago
On multiple foreground cosegmentation
In this paper, we address a challenging image segmentation problem called multiple foreground cosegmentation (MFC), which concerns a realistic scenario in general Webuser photo se...
Gunhee Kim, Eric P. Xing
SENSYS
2010
ACM
13 years 5 months ago
Privacy-aware regression modeling of participatory sensing data
Many participatory sensing applications use data collected by participants to construct a public model of a system or phenomenon. For example, a health application might compute a...
Hossein Ahmadi, Nam Pham, Raghu K. Ganti, Tarek F....
ATAL
2005
Springer
14 years 1 months ago
Decentralized voting with unconditional privacy
The aggregation of conflicting preferences is a key issue in multiagent systems. Due to its universality, voting has a central role among preference aggregation mechanisms. Votin...
Felix Brandt, Tuomas Sandholm
ASIACRYPT
2003
Springer
14 years 21 days ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert