Sciweavers

5476 search results - page 78 / 1096
» Resettably Secure Computation
Sort
View
117
Voted
IPPS
2002
IEEE
15 years 8 months ago
Fine-Grain Access Control for Securing Shared Resources in Computational Grids
Ali Raza Butt, Sumalatha Adabala, Nirav H. Kapadia...
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 9 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
130
Voted
FC
2005
Springer
83views Cryptology» more  FC 2005»
15 years 9 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
15 years 7 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa