Sciweavers

2367 search results - page 474 / 474
» Harvesting design for an application framework
Sort
View
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
12 years 10 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
SIGMOD
2012
ACM
212views Database» more  SIGMOD 2012»
12 years 1 months ago
Local structure and determinism in probabilistic databases
While extensive work has been done on evaluating queries over tuple-independent probabilistic databases, query evaluation over correlated data has received much less attention eve...
Theodoros Rekatsinas, Amol Deshpande, Lise Getoor