Sciweavers

1816 search results - page 9 / 364
» Trace oblivious computation
Sort
View
ICICS
2005
Springer
14 years 3 months ago
Private Itemset Support Counting
Private itemset support counting (PISC) is a basic building block of various privacy-preserving data mining algorithms. Briefly, in PISC, Client wants to know the support of her i...
Sven Laur, Helger Lipmaa, Taneli Mielikäinen
DBSEC
2010
129views Database» more  DBSEC 2010»
13 years 11 months ago
Secure Outsourcing of DNA Searching via Finite Automata
This work treats the problem of error-resilient DNA searching via oblivious evaluation of finite automata, formulated as follows: a client has a DNA sequence, and a service provid...
Marina Blanton, Mehrdad Aliasgari
PRDC
2006
IEEE
14 years 3 months ago
Quantum Oblivious Transfer and Fair Digital Transactions
Yao-Hsin Chou, I-Ming Tsai, Chien-Ming Ko, Sy-Yen ...
NOCS
2009
IEEE
14 years 4 months ago
Static virtual channel allocation in oblivious routing
Most virtual channel routers have multiple virtual channels to mitigate the effects of head-of-line blocking. When there are more flows than virtual channels at a link, packets o...
Keun Sup Shim, Myong Hyon Cho, Michel A. Kinsy, Ti...
PKC
1999
Springer
125views Cryptology» more  PKC 1999»
14 years 2 months ago
Anonymous Fingerprinting Based on Committed Oblivious Transfer
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared a...
Josep Domingo-Ferrer