Sciweavers

162 search results - page 6 / 33
» Outsourcing Multi-Party Computation
Sort
View
ASIACRYPT
2009
Springer
14 years 4 months ago
Secure Multi-party Computation Minimizing Online Rounds
Multi-party secure computations are general important procedures to compute any function while keeping the security of private inputs. In this work we ask whether preprocessing can...
Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yun...
WISEC
2010
ACM
14 years 3 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...
TKDE
2012
215views Formal Methods» more  TKDE 2012»
12 years 4 days ago
Outsourced Similarity Search on Metric Data Assets
—This paper considers a cloud computing setting in which similarity querying of metric data is outsourced to a service provider. The data is to be revealed only to trusted users,...
Man Lung Yiu, Ira Assent, Christian S. Jensen, Pan...
ECIS
2004
13 years 11 months ago
A study of information systems outsourcing risks
Despite the considerable growth of Information Systems (IS) outsourcing in recent years, this trend is still the object of strong criticism. This study has as its aim to show the ...
Reyes-G. Gonzalez, Jose Gasco, Juan Llopis
CRYPTO
2010
Springer
109views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
Rosario Gennaro, Craig Gentry, Bryan Parno