Sciweavers

1005 search results - page 91 / 201
» Practical Secure Function Evaluation
Sort
View
CCGRID
2005
IEEE
14 years 3 months ago
Performance evaluation of JXTA communication layers
— The arrival of the P2P model has opened many new avenues for research within the field of distributed computing. This is mainly due to important practical features (such as su...
Gabriel Antoniu, Philip J. Hatcher, Mathieu Jan, D...
ECIS
2004
13 years 11 months ago
Using IT to Make Place in Space: Evaluating Mobile Technology Support for Sport Spectators
This paper reports results from two field trials of TrottingPal, a mobile system that supports event information management and seamless collaboration between spectators at the tr...
Andreas Nilsson
EICS
2009
ACM
14 years 4 months ago
User evaluation of OIDE: a rapid prototyping platform for multimodal interaction
The Open Interface Development Environment (OIDE) was developed as part of the OpenInterface (OI) platform, an open source framework for the rapid development of multimodal intera...
Marilyn Rose McGee-Lennon, Andrew Ramsay, David K....
CORR
2011
Springer
174views Education» more  CORR 2011»
13 years 5 months ago
Distributed Private Data Analysis: On Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs – secure function evaluation (SFE) and differential...
Amos Beimel, Kobbi Nissim, Eran Omri
CORR
2006
Springer
111views Education» more  CORR 2006»
13 years 10 months ago
Length-based cryptanalysis: The case of Thompson's Group
The length-based approach is a heuristic for solving randomly generated equations in groups which possess a reasonably behaved length function. We describe several improvements of ...
Dima Ruinskiy, Adi Shamir, Boaz Tsaban