Sciweavers

1288 search results - page 165 / 258
» Securing aspect composition
Sort
View
ICALP
2005
Springer
14 years 4 months ago
Single-Database Private Information Retrieval with Constant Communication Rate
We present a single-database private information retrieval (PIR) scheme with communication complexity O(k+d), where k ≥ log n is a security parameter that depends on the database...
Craig Gentry, Zulfikar Ramzan
SP
1990
IEEE
14 years 2 months ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III
EUROCRYPT
2008
Springer
14 years 16 days ago
Obfuscating Point Functions with Multibit Output
We study obfuscation of point functions with multibit output and other related functions. A point function with multibit output returns a string on a single input point and zero ev...
Ran Canetti, Ronny Ramzi Dakdouk
ICISC
2008
126views Cryptology» more  ICISC 2008»
14 years 6 days ago
Essentially Optimal Universally Composable Oblivious Transfer
Oblivious transfer is one of the most important cryptographic primitives, both for theoretical and practical reasons and several protocols were proposed during the years. We provid...
Ivan Damgård, Jesper Buus Nielsen, Claudio O...
CHI
2011
ACM
13 years 2 months ago
Home automation in the wild: challenges and opportunities
Visions of smart homes have long caught the attention of researchers and considerable effort has been put toward enabling home automation. However, these technologies have not bee...
A. J. Bernheim Brush, Bongshin Lee, Ratul Mahajan,...