Sciweavers

2432 search results - page 23 / 487
» Cryptographic logical relations
Sort
View
ICICS
2009
Springer
15 years 4 months ago
GUC-Secure Join Operator in Distributed Relational Database
Privacy-preserving SQL computation in distributed relational database is one of important applications of secure multiparty computation. In contrast with comparatively more works o...
Yuan Tian, Hao Zhang
IJCNN
2006
IEEE
15 years 3 months ago
Generalizing Independent Component Analysis for Two Related Data Sets
— We introduce in this paper methods for finding mutually corresponding dependent components from two different but related data sets in an unsupervised (blind) manner. The basi...
Juha Karhunen, Tomas Ukkonen
ASIAN
2005
Springer
103views Algorithms» more  ASIAN 2005»
15 years 3 months ago
Implementing a Tamper-Evident Database System
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount...
Gerome Miklau, Dan Suciu
CCS
2010
ACM
14 years 10 months ago
Computational indistinguishability logic
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational models. It captures reasoning patterns that are common in p...
Gilles Barthe, Marion Daubignard, Bruce M. Kapron,...
CORR
2010
Springer
71views Education» more  CORR 2010»
14 years 10 months ago
The relational model is injective for Multiplicative Exponential Linear Logic (without weakenings)
We show that for Multiplicative Exponential Linear Logic (without weakenings) the syntactical equivalence relation on proofs induced by cut-elimination coincides with the semantic ...
Daniel de Carvalho, Lorenzo Tortora de Falco