Sciweavers

24188 search results - page 355 / 4838
» Computing on Encrypted Data
Sort
View
CSREASAM
2006
15 years 5 months ago
Enhanced Group Key Generation Protocol
Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, th...
Sunghyuck Hong, Noé Lopez-Benitez
CCS
2010
ACM
15 years 4 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
SCN
2008
Springer
15 years 4 months ago
Simplified Submission of Inputs to Protocols
Consider an electronic election scheme implemented using a mix-net; a large number of voters submit their votes and then a smaller number of servers compute the result. The mix-net...
Douglas Wikström
COMPUTER
2007
93views more  COMPUTER 2007»
15 years 4 months ago
The Computing Profession and Higher Education
not things, but abstractions that represent things. Data use provides human civilization’s foundation, and computers and other digital technologies have merely amplified this us...
W. Neville Holmes
SODA
2008
ACM
126views Algorithms» more  SODA 2008»
15 years 5 months ago
On distributing symmetric streaming computations
A common approach for dealing with large data sets is to stream over the input in one pass, and perform computations using sublinear resources. For truly massive data sets, howeve...
Jon Feldman, S. Muthukrishnan, Anastasios Sidiropo...