Sciweavers

96 search results - page 1 / 20
» Revealing Additional Information in Two-Party Computations
Sort
View
ASIACRYPT
2005
Springer
13 years 10 months ago
Revealing Additional Information in Two-Party Computations
Abstract. A two-argument function is computed privately by two parties if after the computation, no party should know anything about the other inputs except for what he is able to ...
Andreas Jakoby, Maciej Liskiewicz
NDSS
2009
IEEE
13 years 11 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
ASIACRYPT
2005
Springer
13 years 10 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
CHI
2010
ACM
13 years 11 months ago
iCon: utilizing everyday objects as additional, auxiliary and instant tabletop controllers
This work describes a novel approach to utilizing everyday objects of users as additional, auxiliary, and instant tabletop controllers. Based on this approach, a prototype platfor...
Kai-Yin Cheng, Rong-Hao Liang, Bing-Yu Chen, Rung-...
ISCI
2007
99views more  ISCI 2007»
13 years 4 months ago
Privacy-preserving algorithms for distributed mining of frequent itemsets
Standard algorithms for association rule mining are based on identification of frequent itemsets. In this paper, we study how to maintain privacy in distributed mining of frequen...
Sheng Zhong