Sciweavers

321 search results - page 33 / 65
» Secure Multiparty Computation of Approximations
Sort
View
108
Voted
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
16 years 24 days ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...
PKC
1999
Springer
125views Cryptology» more  PKC 1999»
15 years 4 months ago
Anonymous Fingerprinting Based on Committed Oblivious Transfer
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared a...
Josep Domingo-Ferrer
EUROCRYPT
2010
Springer
15 years 5 months ago
Adaptively Secure Broadcast
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the s...
Martin Hirt, Vassilis Zikas
95
Voted
CONCUR
2010
Springer
15 years 1 months ago
Session Types for Access and Information Flow Control
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both sessi...
Sara Capecchi, Ilaria Castellani, Mariangiola Deza...
77
Voted
AINA
2007
IEEE
15 years 6 months ago
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation
Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Taka...