Sciweavers

24188 search results - page 225 / 4838
» Computing on Encrypted Data
Sort
View
179
Voted
TCC
2007
Springer
170views Cryptology» more  TCC 2007»
15 years 9 months ago
Secure Linear Algebra Using Linearly Recurrent Sequences
In this work we present secure two-party protocols for various core problems in linear algebra. Our main result is a protocol to obliviously decide singularity of an encrypted matr...
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew...
108
Voted
TGC
2007
Springer
15 years 9 months ago
Adversaries and Information Leaks (Tutorial)
Secure information flow analysis aims to prevent programs from leaking their H (high) inputs to their L (low) outputs. A major challenge in this area is to relax the standard noni...
Geoffrey Smith
155
Voted
CCS
2005
ACM
15 years 9 months ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
140
Voted
GCC
2003
Springer
15 years 8 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
70
Voted
COMPUTER
2006
63views more  COMPUTER 2006»
15 years 3 months ago
The Data Doughnut and the Software Hole
W. Neville Holmes