Sciweavers

2367 search results - page 474 / 474
» Harvesting design for an application framework
Sort
View
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
SIGMOD
2012
ACM
212views Database» more  SIGMOD 2012»
13 years 15 hour ago
Local structure and determinism in probabilistic databases
While extensive work has been done on evaluating queries over tuple-independent probabilistic databases, query evaluation over correlated data has received much less attention eve...
Theodoros Rekatsinas, Amol Deshpande, Lise Getoor