270
click to vote
CANS
9 years 8 months ago
2015 Springer
Secure Two-Party Computation (STC) allows two mutually untrusting parties to securely evaluate a function on their private inputs. While tremendous progress has been made towards r...
247
click to vote
CANS
9 years 8 months ago
2015 Springer
Abstract Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and investigate the resistance of linear secret-sharing schemes to mass survei...
244
click to vote
CANS
9 years 8 months ago
2015 Springer
Besides the opportunities offered by the all-embracing Internet of Things (IoT) technology, it also poses a tremendous threat to the privacy of the carriers of these devices. In t...
242
click to vote
CANS
9 years 8 months ago
2015 Springer
Existing work on data collection and analysis for aggregation is mainly focused on confidentiality issues. That is, the untrusted Aggregator learns only the aggregation result wit...
239
click to vote
CANS
9 years 8 months ago
2015 Springer
Policies are the corner stones of today’s computer systems. They define secure states and safe operations. A common problem with policies is that their enforcement is often in c...
|