Sciweavers

546 search results - page 10 / 110
» On the Power of Secure Two-Party Computation
Sort
View
TCOS
2010
14 years 4 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
GIS
2006
ACM
14 years 9 months ago
Reactions to geovisualization: an experience from a European project
The paper is written jointly by two parties, computer scientists specializing in geovisualization and experts in forestry, who cooperated within a joint project. The authors tell ...
Gennady L. Andrienko, Natalia V. Andrienko, Richar...
70
Voted
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
15 years 4 months ago
Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid
The US Power Industry is in the process of overhauling the Power Grid to make it more secure, reliable, and available. The IT systems that comprise a major part of this change nee...
Himanshu Khurana, Mohammad Maifi Hasan Khan, Von W...
STOC
2005
ACM
112views Algorithms» more  STOC 2005»
15 years 10 months ago
Covert two-party computation
We introduce the novel concept of covert two-party computation. Whereas ordinary secure two-party computation only guarantees that no more knowledge is leaked about the inputs of t...
Luis von Ahn, Nicholas J. Hopper, John Langford
EUROCRYPT
2004
Springer
15 years 1 months ago
Efficient Private Matching and Set Intersection
We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has m...
Michael J. Freedman, Kobbi Nissim, Benny Pinkas