Sciweavers

521 search results - page 32 / 105
» Scalable Secure Multiparty Computation
Sort
View
117
Voted
TCC
2010
Springer
169views Cryptology» more  TCC 2010»
15 years 11 months ago
On Complete Primitives for Fairness
Abstract. For secure two-party and multi-party computation with abort, classification of which primitives are complete has been extensively studied in the literature. However, for...
S. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostr...
109
Voted
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
15 years 2 months ago
Complexity in scalable computing
f abstraction (hardware) to the highest (people). This issue's theme encompasses this entire spectrum. The lead author of each article resides in the Scalable Computing Resear...
Damian W. I. Rouson
99
Voted
PDCAT
2005
Springer
15 years 8 months ago
A Scalable Security Architecture for Grid
Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong
144
Voted
SRDS
2010
IEEE
15 years 14 days ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
115
Voted
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
How Should We Solve Search Problems Privately?
Abstract. Secure multiparty computation allows a group of distrusting parties to jointly compute a (possibly randomized) function of their inputs. However, it is often the case tha...
Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinre...