Sciweavers

8972 search results - page 37 / 1795
» Private Information Retrieval
Sort
View
82
Voted
AIM
2006
15 years 10 days ago
Experimenting with ICT-intensive public and private collaboration projects: The canadian experience
This research examines nine ICT-intensive and innovative projects involving both public and private sectors in the delivery of public services and attempts to identify their main c...
Lise Préfontaine, L. Ricard, Hél&egr...
82
Voted
CRYPTO
2009
Springer
87views Cryptology» more  CRYPTO 2009»
15 years 5 months ago
Reconstructing RSA Private Keys from Random Key Bits
sion of an extended abstract published in Proceedings of Crypto 2009, Springer-Verlag, 2009. Available from the IACR Cryptology ePrint Archive as Report 2008/510. We show that an ...
Nadia Heninger, Hovav Shacham
79
Voted
MFCS
2009
Springer
15 years 5 months ago
Private Capacities in Mechanism Design
Algorithmic mechanism design considers distributed settings where the participants, termed agents, cannot be assumed to follow the protocol but rather their own interests. The pro...
Vincenzo Auletta, Paolo Penna, Giuseppe Persiano
83
Voted
ESORICS
2009
Springer
15 years 11 months ago
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Abstract. Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Bran...
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov...
CSREASAM
2006
15 years 10 days ago
An Efficient Bloom Filter Based Solution for Multiparty Private Matching
- The issue of privacy becomes more and more important. On the other hand, online collaboration among different parties is almost unavoidable. How to allow collaboration while prot...
Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. ...