Sciweavers

4413 search results - page 757 / 883
» Security for biometric data
Sort
View
STOC
2012
ACM
236views Algorithms» more  STOC 2012»
13 years 6 months ago
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
We propose a new notion of secure multiparty computation aided by a computationally-powerful but untrusted “cloud” server. In this notion that we call on-the-fly multiparty c...
Adriana López-Alt, Eran Tromer, Vinod Vaiku...
138
Voted
HPCA
2008
IEEE
16 years 4 months ago
Thread-safe dynamic binary translation using transactional memory
Dynamic binary translation (DBT) is a runtime instrumentation technique commonly used to support profiling, optimization, secure execution, and bug detection tools for application...
JaeWoong Chung, Michael Dalton, Hari Kannan, Chris...
237
Voted
POPL
2006
ACM
16 years 4 months ago
Harmless advice
This paper defines an object-oriented language with harmless aspect-oriented advice. A piece of harmless advice is a computation that, like ordinary aspect-oriented advice, execut...
Daniel S. Dantas, David Walker
110
Voted
IEEEARES
2009
IEEE
15 years 10 months ago
Generating User-Understandable Privacy Preferences
—Making use of the World Wide Web’s numerous services increasingly requires the disclosure of personal user data. While these data represent an important value for service prov...
Jan Kolter, Günther Pernul
141
Voted
PAISI
2009
Springer
15 years 10 months ago
Discovering Compatible Top-K Theme Patterns from Text Based on Users' Preferences
Discovering a representative set of theme patterns from a large amount of text for interpreting their meaning has always been concerned by researches of both data mining and inform...
Yongxin Tong, Shilong Ma, Dan Yu, Yuanyuan Zhang, ...