Sciweavers

528 search results - page 13 / 106
» What Can We Learn Privately
Sort
View
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
129
Voted
WEBDB
2009
Springer
172views Database» more  WEBDB 2009»
15 years 11 months ago
PrivatePond: Outsourced Management of Web Corpuses
With the rise of cloud computing, it is increasingly attractive for end-users (organizations and individuals) to outsource the management of their data to a small number of larges...
Daniel Fabbri, Arnab Nandi, Kristen LeFevre, H. V....
ICML
2008
IEEE
16 years 5 months ago
Knows what it knows: a framework for self-aware learning
We introduce a learning framework that combines elements of the well-known PAC and mistake-bound models. The KWIK (knows what it knows) framework was designed particularly for its...
Lihong Li, Michael L. Littman, Thomas J. Walsh
MMMACNS
2005
Springer
15 years 10 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
121
Voted
WPES
2003
ACM
15 years 9 months ago
Secure and private sequence comparisons
We give an efficient protocol for sequence comparisons of the edit-distance kind, such that neither party reveals anything about their private sequence to the other party (other t...
Mikhail J. Atallah, Florian Kerschbaum, Wenliang D...