Sciweavers

6195 search results - page 161 / 1239
» Cloud Computing Security
Sort
View
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 10 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
FC
2005
Springer
83views Cryptology» more  FC 2005»
15 years 10 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
15 years 8 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa