Sciweavers

562 search results - page 11 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
134
Voted
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
15 years 9 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
141
Voted
SASN
2004
ACM
15 years 9 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner
FOSSACS
2010
Springer
15 years 10 months ago
Parameterised Multiparty Session Types
For many application-level distributed protocols and parallel algorithms, the set of participants, the number of messages or the interaction structure are only known at run-time. T...
Nobuko Yoshida, Pierre-Malo Deniélou, Andi ...
105
Voted
CSCW
2006
ACM
15 years 9 months ago
Where's the "party" in "multi-party"?: analyzing the structure of small-group sociable talk
Spontaneous multi-party interaction – conversation among groups of three or more participants – is part of daily life. While automated modeling of such interactions has receiv...
Paul M. Aoki, Margaret H. Szymanski, Luke D. Plurk...
117
Voted
GECCO
2007
Springer
183views Optimization» more  GECCO 2007»
15 years 10 months ago
A genetic algorithm for privacy preserving combinatorial optimization
We propose a protocol for a local search and a genetic algorithm for the distributed traveling salesman problem (TSP). In the distributed TSP, information regarding the cost funct...
Jun Sakuma, Shigenobu Kobayashi