Sciweavers

4335 search results - page 299 / 867
» Privatizing Constraint Optimization
Sort
View
ISJGP
2010
15 years 1 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
COMPSAC
2011
IEEE
14 years 4 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
IACR
2011
94views more  IACR 2011»
14 years 4 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
ICIP
2006
IEEE
16 years 6 months ago
Optimum Watermark Design by Vector Space Projections
We introduce an optimum watermark embedding technique that satisfies common watermarking requirements such as visual fidelity, sufficient embedding rate, robustness against noise ...
Oktay Altun, Gaurav Sharma, Mark F. Bocko
VTC
2006
IEEE
116views Communications» more  VTC 2006»
15 years 10 months ago
Distributed Estimation in a Power Constrained Sensor Network
— This paper derives the optimum non-uniform quantization scheme for a distributed estimation problem based on noisy observations in a wireless sensor network. The optimal quanti...
Visvakumar Aravinthan, Sudharman K. Jayaweera, Kos...