Sciweavers

1005 search results - page 97 / 201
» Practical Secure Function Evaluation
Sort
View
KDD
2004
ACM
110views Data Mining» more  KDD 2004»
14 years 10 months ago
Generalizing the notion of support
The goal of this paper is to show that generalizing the notion of support can be useful in extending association analysis to non-traditional types of patterns and non-binary data....
Michael Steinbach, Pang-Ning Tan, Hui Xiong, Vipin...
CSSE
2006
IEEE
13 years 10 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
EUROSYS
2009
ACM
14 years 7 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...
ACSAC
2005
IEEE
14 years 3 months ago
mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients
Client-server applications often do not scale well when a large number of clients access a single server. To solve this, a new trend is to allow a client to download data from oth...
Jun Li, Xun Kang
ASIACRYPT
2005
Springer
14 years 3 months ago
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
Abstract. We give improved upper bounds on the communication complexity of optimally-resilient secure multiparty computation in the cryptographic model. We consider evaluating an n...
Martin Hirt, Jesper Buus Nielsen