Sciweavers

24529 search results - page 227 / 4906
» Computing on Authenticated Data
Sort
View
108
Voted
SIGKDD
2010
123views more  SIGKDD 2010»
14 years 10 months ago
Fully decentralized computation of aggregates over data streams
Luca Becchetti, Ilaria Bordino, Stefano Leonardi, ...
HUC
2010
Springer
15 years 2 months ago
UBI challenge workshop 2010: real world urban computing
This workshop promotes ubiquitous computing research in authentic urban setting, with real users and with sufficient scale and time span. We first motivate why such research is im...
Timo Ojala, Jukka Riekki
131
Voted
ICALP
2010
Springer
15 years 5 months ago
From Secrecy to Soundness: Efficient Verification via Secure Computation
d Abstract) Benny Applebaum1 , Yuval Ishai2 , and Eyal Kushilevitz3 1 Computer Science Department, Weizmann Institute of Science 2 Computer Science Department, Technion and UCLA 3 ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
127
Voted
FOCS
2006
IEEE
15 years 9 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...
146
Voted
JAVA
2001
Springer
15 years 8 months ago
A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system’s design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks, e...
Peter R. Cappello, Dimitros Mourloukos