Sciweavers

5344 search results - page 867 / 1069
» Privacy-Preserving Set Operations
Sort
View
201
Voted
ER
2011
Springer
265views Database» more  ER 2011»
14 years 3 months ago
Modeling the Propagation of User Preferences
Abstract. User preferences are a fundamental ingredient of personalized database applications, in particular those in which the user context plays a key role. Given a set of prefer...
Paolo Ciaccia, Riccardo Torlone
160
Voted
IACR
2011
107views more  IACR 2011»
14 years 3 months ago
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not...
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohl...
123
Voted
IACR
2011
94views more  IACR 2011»
14 years 3 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
163
Voted
ICDCS
2011
IEEE
14 years 3 months ago
Smart Redundancy for Distributed Computation
Many distributed software systems allow participation by large numbers of untrusted, potentially faulty components on an open network. As faults are inevitable in this setting, th...
Yuriy Brun, George Edwards, Jae Young Bang, Nenad ...
148
Voted
RTAS
2006
IEEE
15 years 9 months ago
METERG: Measurement-Based End-to-End Performance Estimation Technique in QoS-Capable Multiprocessors
Multiprocessor systems present serious challenges in the design of real-time systems due to the wider variation of execution time of an instruction sequence compared to a uniproce...
Jae W. Lee, Krste Asanovic