Sciweavers

30 search results - page 4 / 6
» Efficient security primitives derived from a secure aggregat...
Sort
View
95
Voted
CSSE
2006
IEEE
15 years 1 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
120
Voted
COMPUTER
2007
123views more  COMPUTER 2007»
15 years 1 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
112
Voted
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
14 years 29 days ago
The PHOTON Family of Lightweight Hash Functions
RFID security is currently one of the major challenges cryptography has to face, often solved by protocols assuming that an on-tag hash function is available. In this article we pr...
Jian Guo 0001, Thomas Peyrin, Axel Poschmann
109
Voted
AGENTS
1999
Springer
15 years 5 months ago
Top-Down Search for Coordinating the Hierarchical Plans of Multiple Agents
Uncertain and complex environments demand that an agent be able to anticipate the actions of others in order to avoid resource conflicts with them and to realize its goals. Confli...
Bradley J. Clement, Edmund H. Durfee
121
Voted
SDMW
2004
Springer
15 years 6 months ago
Experimental Analysis of Privacy-Preserving Statistics Computation
The recent investigation of privacy-preserving data mining and other kinds of privacy-preserving distributed computation has been motivated by the growing concern about the privacy...
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqian...