Sciweavers

162 search results - page 7 / 33
» Outsourcing Multi-Party Computation
Sort
View
INDOCRYPT
2003
Springer
14 years 2 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
14 years 3 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
TMM
2010
181views Management» more  TMM 2010»
13 years 4 months ago
Mining Group Nonverbal Conversational Patterns Using Probabilistic Topic Models
Abstract--The automatic discovery of group conversational behavior is a relevant problem in social computing. In this paper, we present an approach to address this problem by defin...
Dinesh Babu Jayagopi, Daniel Gatica-Perez
INFOCOM
2011
IEEE
13 years 1 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
PET
2009
Springer
14 years 4 months ago
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
: © Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao HP Labor...
Brian Thompson, Stuart Haber, William G. Horne, To...