Sciweavers

1005 search results - page 122 / 201
» Practical Secure Function Evaluation
Sort
View
USS
2010
13 years 8 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...
CCS
2011
ACM
12 years 10 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
SAINT
2003
IEEE
14 years 3 months ago
A Generalized Target-Driven Cache Replacement Policy for Mobile Environments
Caching frequently accessed data items on the client side is an effective technique to improve the system performance in wireless networks. Due to cache size limitations, cache re...
Liangzhong Yin, Guohong Cao, Ying Cai
ISBI
2008
IEEE
14 years 11 months ago
AutoMPR: Automatic detection of standard planes in 3D echocardiography
3D echocardiography is one of the emerging real-time imaging modalities that is increasingly used in clinical practice to assess cardiac function. It provides for evaluation a mor...
Xiaoguang Lu, Bogdan Georgescu, Yefeng Zheng, Joan...
COMPSAC
2009
IEEE
14 years 2 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye