Sciweavers

528 search results - page 24 / 106
» What Can We Learn Privately
Sort
View
CCS
2006
ACM
13 years 11 months ago
Data collection with self-enforcing privacy
Consider a pollster who wishes to collect private, sensitive data from a number of distrustful individuals. How might the pollster convince the respondents that it is trustworthy?...
Philippe Golle, Frank McSherry, Ilya Mironov
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
IEEEIAS
2008
IEEE
14 years 2 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
ICRA
2008
IEEE
134views Robotics» more  ICRA 2008»
14 years 2 months ago
Real-time learning of resolved velocity control on a Mitsubishi PA-10
Abstract— Learning inverse kinematics has long been fascinating the robot learning community. While humans acquire this transformation to complicated tool spaces with ease, it is...
Jan Peters, Duy Nguyen-Tuong
STOC
1999
ACM
122views Algorithms» more  STOC 1999»
13 years 12 months ago
Oblivious Transfer and Polynomial Evaluation
Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input is a polynomial P, and a receiver whose input is a value α. At the end of the protocol t...
Moni Naor, Benny Pinkas