Sciweavers

176 search results - page 1 / 36
» The Cost of Privatization
Sort
View
WDAG
2010
Springer
204views Algorithms» more  WDAG 2010»
13 years 3 months ago
The Cost of Privatization
Software transactional memory (STM) guarantees that a transaction, consisting of a sequence of operations on the memory, appears to be executed atomically. In practice, it is impor...
Hagit Attiya, Eshcar Hillel
ACISP
2005
Springer
13 years 10 months ago
Tunable Balancing of RSA
We propose a key generation method for RSA moduli which allows the cost of the public operations (encryption/verifying) and the private operations (decryption/signing) to be balanc...
Steven D. Galbraith, Chris Heneghan, James F. McKe...
ACNS
2009
Springer
118views Cryptology» more  ACNS 2009»
13 years 9 months ago
Efficient Robust Private Set Intersection
Computing Set Intersection privately and efficiently between two mutually mistrusting parties is an important basic procedure in the area of private data mining. Assuring robustnes...
Dana Dachman-Soled, Tal Malkin, Mariana Raykova, M...
PKC
1998
Springer
135views Cryptology» more  PKC 1998»
13 years 9 months ago
A Signcryption Scheme with Signature Directly Verifiable by Public Key
Signcryption, first proposed by Zheng [4,5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step,...
Feng Bao, Robert H. Deng
DEXAW
2009
IEEE
141views Database» more  DEXAW 2009»
13 years 6 months ago
Improving Practical Performance on Secure and Private Collaborative Linear Programming
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
Rafael Deitos, Florian Kerschbaum