Sciweavers

5665 search results - page 93 / 1133
» Introduction to Computer Security
Sort
View
128
Voted
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
15 years 6 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa
122
Voted
FOCS
2006
IEEE
15 years 8 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...
250
Voted
POPL
2001
ACM
16 years 2 months ago
Programming language methods in computer security
traction
John C. Mitchell