Sciweavers

147 search results - page 3 / 30
» A Distributed and Oblivious Heap
Sort
View
ASIACRYPT
2000
Springer
13 years 9 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
ICPP
2005
IEEE
13 years 11 months ago
A Novel Approach for Detecting Heap-Based Loop-Carried Dependences
Adrian Tineo, Francisco Corbera, Angeles G. Navarr...
JOC
2007
94views more  JOC 2007»
13 years 5 months ago
On Unconditionally Secure Distributed Oblivious Transfer
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one o...
Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Dou...
IPPS
2005
IEEE
13 years 11 months ago
Optimal Oblivious Path Selection on the Mesh
— In the oblivious path selection problem, each packet in the network independently chooses a path, which is an important property if the routing algorithm is to be independent o...
Costas Busch, Malik Magdon-Ismail, Jing Xi