Sciweavers

132 search results - page 12 / 27
» Joint security
Sort
View
ASIACRYPT
2005
Springer
14 years 1 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
CTRSA
2007
Springer
98views Cryptology» more  CTRSA 2007»
13 years 9 months ago
Identity-Based Multi-signatures from RSA
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
Mihir Bellare, Gregory Neven
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 7 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas
ICRA
2008
IEEE
132views Robotics» more  ICRA 2008»
14 years 1 months ago
The OmniTread OT-4 serpentine robot
Serpentine robots are slender, multi-segmented vehicles designed to provide greater mobility than conventional mobile robots. Serpentine robots are ideally suited for urban search...
Johann Borenstein, Adam Borrell
ICASSP
2008
IEEE
14 years 1 months ago
An audio watermarking method based on molecular matching pursuit
In this paper we introduce a new watermarking model combining a joint time frequency (TF) representation using the molecular matching pursuit (MMP) algorithm and a psychoacoustic ...
Mathieu Parvaix, Sridhar Krishnan, Cornel Ioana