Sciweavers

4335 search results - page 8 / 867
» Privatizing Constraint Optimization
Sort
View
INFOCOM
2003
IEEE
15 years 5 months ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
PODC
1998
ACM
15 years 4 months ago
Amortizing Randomness in Private Multiparty Computations
We study the relationship between the number of rounds needed to repeatedly perform a private computation i.e., where there are many sets of inputs sequentially given to the play...
Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosé...
DICTA
2003
15 years 1 months ago
Image Ownership Verification via Private Pattern and Watermarking Wavelet Filters
Abstract. In this paper, we propose a watermarking scheme for the image ownership verification in terms of a private key pattern and wavelet filters. The watermarking is mainly ach...
Zhuan Qing Huang, Zhuhan Jiang
ICC
2009
IEEE
142views Communications» more  ICC 2009»
15 years 6 months ago
A Generalized Two-Way Relay Channel with Private Information for the Relay
—In the conventional two-way relay channel, two sources exchange information with help from a relay. We introduce a generalized two-way relay channel where each source additional...
Chin Keong Ho, Kiran T. Gowda, Sumei Sun
ICALP
2007
Springer
15 years 6 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai