Sciweavers

147 search results - page 3 / 30
» A Distributed and Oblivious Heap
Sort
View
ASIACRYPT
2000
Springer
15 years 4 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
ICPP
2005
IEEE
15 years 5 months ago
A Novel Approach for Detecting Heap-Based Loop-Carried Dependences
Adrian Tineo, Francisco Corbera, Angeles G. Navarr...
JOC
2007
94views more  JOC 2007»
14 years 11 months ago
On Unconditionally Secure Distributed Oblivious Transfer
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one o...
Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Dou...
IPPS
2005
IEEE
15 years 5 months ago
Optimal Oblivious Path Selection on the Mesh
— In the oblivious path selection problem, each packet in the network independently chooses a path, which is an important property if the routing algorithm is to be independent o...
Costas Busch, Malik Magdon-Ismail, Jing Xi