Sciweavers

340 search results - page 20 / 68
» Two-Party Computing with Encrypted Data
Sort
View
SIGMOD
2010
ACM
236views Database» more  SIGMOD 2010»
14 years 13 days ago
Differentially private aggregation of distributed time-series with transformation and encryption
We propose PASTE, the first differentially private aggregation algorithms for distributed time-series data that offer good practical utility without any trusted server. PASTE add...
Vibhor Rastogi, Suman Nath
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
12 years 3 months ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...
JCP
2008
119views more  JCP 2008»
13 years 7 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
BSDCON
2003
13 years 9 months ago
GBDE-GEOM Based Disk Encryption
The ever increasing mobility of computers has made protection of data on digital storage media an important requirement in a number of applications and situations. GBDE is a stron...
Poul-Henning Kamp
ACL
1998
13 years 9 months ago
Exploring the Characteristics of Multi-Party Dialogues
This paper describes novel results on the characteristics of three-party dialogues by quantitatively comparing them with those of two-party. In previous dialogue research, two-par...
Masato Ishizaki, Tsuneaki Kato