Sciweavers

4335 search results - page 8 / 867
» Privatizing Constraint Optimization
Sort
View
INFOCOM
2003
IEEE
14 years 25 days ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
PODC
1998
ACM
13 years 11 months ago
Amortizing Randomness in Private Multiparty Computations
We study the relationship between the number of rounds needed to repeatedly perform a private computation i.e., where there are many sets of inputs sequentially given to the play...
Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosé...
DICTA
2003
13 years 9 months ago
Image Ownership Verification via Private Pattern and Watermarking Wavelet Filters
Abstract. In this paper, we propose a watermarking scheme for the image ownership verification in terms of a private key pattern and wavelet filters. The watermarking is mainly ach...
Zhuan Qing Huang, Zhuhan Jiang
ICC
2009
IEEE
142views Communications» more  ICC 2009»
14 years 2 months ago
A Generalized Two-Way Relay Channel with Private Information for the Relay
—In the conventional two-way relay channel, two sources exchange information with help from a relay. We introduce a generalized two-way relay channel where each source additional...
Chin Keong Ho, Kiran T. Gowda, Sumei Sun
ICALP
2007
Springer
14 years 1 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai