Sciweavers

562 search results - page 12 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
134
Voted
WISEC
2010
ACM
15 years 9 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...
CCS
2009
ACM
15 years 10 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
138
Voted
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...
121
Voted
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption
Abstract. Non-committing encryption enables the construction of multiparty computation protocols secure against an adaptive adversary in the computational setting where private cha...
Ivan Damgård, Jesper Buus Nielsen
ICMI
2009
Springer
175views Biometrics» more  ICMI 2009»
15 years 1 months ago
Discovering group nonverbal conversational patterns with topics
This paper addresses the problem of discovering conversational group dynamics from nonverbal cues extracted from thin-slices of interaction. We first propose and analyze a novel t...
Dinesh Babu Jayagopi, Daniel Gatica-Perez