Sciweavers

521 search results - page 32 / 105
» Scalable Secure Multiparty Computation
Sort
View
TCC
2010
Springer
169views Cryptology» more  TCC 2010»
14 years 4 months ago
On Complete Primitives for Fairness
Abstract. For secure two-party and multi-party computation with abort, classification of which primitives are complete has been extensively studied in the literature. However, for...
S. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostr...
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
13 years 7 months ago
Complexity in scalable computing
f abstraction (hardware) to the highest (people). This issue's theme encompasses this entire spectrum. The lead author of each article resides in the Scalable Computing Resear...
Damian W. I. Rouson
PDCAT
2005
Springer
14 years 1 months ago
A Scalable Security Architecture for Grid
Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong
SRDS
2010
IEEE
13 years 5 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
How Should We Solve Search Problems Privately?
Abstract. Secure multiparty computation allows a group of distrusting parties to jointly compute a (possibly randomized) function of their inputs. However, it is often the case tha...
Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinre...