Sciweavers

129 search results - page 13 / 26
» Symmetrically Private Information Retrieval
Sort
View
NDSS
2008
IEEE
15 years 10 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
ISW
2005
Springer
15 years 9 months ago
An Oblivious Transfer Protocol with Log-Squared Communication
Abstract. We propose a one-round 1-out-of-n computationally-private information retrieval protocol for -bit strings with low-degree polylogarithmic receivercomputation, linear send...
Helger Lipmaa
ANOR
2002
92views more  ANOR 2002»
15 years 4 months ago
Nash Equilibrium and Subgame Perfection in Observable Queues
A subgame perfection refinement of Nash equilibrium is suggested for games of the following type: each of an infinite number of identical players selects an action using his privat...
Refael Hassin, Moshe Haviv
COMCOM
2010
148views more  COMCOM 2010»
15 years 1 months ago
Privacy versus scalability in radio frequency identification systems
Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-o...
Basel Alomair, Radha Poovendran
137
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Achievable Rates for the Gaussian Interference Relay Channel
—In this paper, an interference relay channel where two independent sources communicate with two destinations by the help of a relay is studied. The relay is full-duplex and emplo...
Onur Sahin, Elza Erkip