Sciweavers

1816 search results - page 5 / 364
» Trace oblivious computation
Sort
View
OSDI
2004
ACM
14 years 10 months ago
Enhancing Server Availability and Security Through Failure-Oblivious Computing
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
IOR
2010
86views more  IOR 2010»
13 years 8 months ago
Computational Methods for Oblivious Equilibrium
Gabriel Y. Weintraub, C. Lanier Benkard, Benjamin ...
IACR
2011
115views more  IACR 2011»
12 years 9 months ago
Multi-Server Oblivious RAM
Secure two-party computation protocol allows two players, Alice with secret input x and Bob with secret input y, to jointly execute an arbitrary program π(x, y) such that only th...
Steve Lu, Rafail Ostrovsky
ICISC
2008
126views Cryptology» more  ICISC 2008»
13 years 11 months ago
Essentially Optimal Universally Composable Oblivious Transfer
Oblivious transfer is one of the most important cryptographic primitives, both for theoretical and practical reasons and several protocols were proposed during the years. We provid...
Ivan Damgård, Jesper Buus Nielsen, Claudio O...