Sciweavers

2001 search results - page 22 / 401
» A security architecture for data privacy and security
Sort
View
AGENTS
1997
Springer
15 years 4 months ago
Fusing Autonomy and Sociability in Robots
Quoting somerobotic examples, I willlist some key issues in fusing autonomy and sociability: tools and control architecture, attention, behavior matching, embodiment, similarity, ...
Yasuo Kuniyoshi
WPES
2003
ACM
15 years 5 months ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
IEEEARES
2010
IEEE
15 years 6 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
CODES
2005
IEEE
15 years 5 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
ICDE
2009
IEEE
168views Database» more  ICDE 2009»
16 years 1 months ago
Privacy-Preserving Singular Value Decomposition
Abstract-- In this paper, we propose secure protocols to perform Singular Value Decomposition (SVD) for two parties over horizontally and vertically partitioned data. We propose va...
Shuguo Han, Wee Keong Ng, Philip S. Yu