Sciweavers

8972 search results - page 25 / 1795
» Private Information Retrieval
Sort
View
MMS
2006
14 years 10 months ago
Using Private and Public Context - An Approach for Mobile Discovery and Search Services
Abstract: When using context information for the customization of mobile applications, privacy issues are important as users want to limit the amount of context information that is...
Thomas Butter, Sina Deibert, Franz Rothlauf
ACMICEC
2004
ACM
128views ECommerce» more  ACMICEC 2004»
15 years 4 months ago
Blind sales in electronic commerce
We start with the usual paradigm in electronic commerce: a consumer who wants to buy from a merchant. However, both parties wish to enjoy maximal privacy. In addition to remaining...
Esma Aïmeur, Gilles Brassard, Flavien Serge M...
ITNG
2006
IEEE
15 years 4 months ago
Two-Party Private Vector Dominance: The All-Or-Nothing Deal
Alice holds a secret integer a while Bob holds a secret integer b, they want to decide on the predicate a > b with no information revealed other than the result. This is the we...
Maged Hamada Ibrahim
STOC
2006
ACM
152views Algorithms» more  STOC 2006»
15 years 11 months ago
Private approximation of search problems
Many approximation algorithms have been presented in the last decades for hard search problems. The focus of this paper is on cryptographic applications, where it is desired to de...
Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb
JOC
2006
71views more  JOC 2006»
14 years 10 months ago
Private Computation: k-Connected versus 1-Connected Networks
We study the role of connectivity of communication networks in private computations under information theoretic settings. It will be shown that some functions can be computed by pr...
Markus Bläser, Andreas Jakoby, Maciej Liskiew...