Sciweavers

65 search results - page 2 / 13
» Efficient Set Operations in the Presence of Malicious Advers...
Sort
View
IAT
2009
IEEE
13 years 2 months ago
Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings
Patrolling environments by means of autonomous mobile robots has received an increasing attention in the last few years. The interest of the agent community is mainly in the develo...
Nicola Basilico, Nicola Gatti, Thomas Rossi, Sofia...
INFOCOM
2007
IEEE
13 years 11 months ago
Resilient Network Coding in the Presence of Byzantine Adversaries
Abstract— Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a mali...
Sidharth Jaggi, Michael Langberg, Sachin Katti, Tr...
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
13 years 10 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
ACNS
2007
Springer
87views Cryptology» more  ACNS 2007»
13 years 6 months ago
Privacy-Preserving Set Union
Recently there has been a significant amount of work on privacy-preserving set operations, including: set intersection [14, 6, 21, 9], testing set disjointness [17], multi-set ope...
Keith B. Frikken
ASIACRYPT
2010
Springer
13 years 2 months ago
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Private Set Intersection (PSI) protocols allow one party ("client") to compute an intersection of its input set with that of another party ("server"), such tha...
Emiliano De Cristofaro, Jihye Kim, Gene Tsudik