Sciweavers

515 search results - page 9 / 103
» Secure Parameters for SWIFFT
Sort
View
ICDM
2010
IEEE
160views Data Mining» more  ICDM 2010»
14 years 9 months ago
A Privacy Preserving Framework for Gaussian Mixture Models
Abstract--This paper presents a framework for privacypreserving Gaussian Mixture Model computations. Specifically, we consider a scenario where a central service wants to learn the...
Madhusudana Shashanka
PET
2012
Springer
13 years 2 months ago
Understanding Statistical Disclosure: A Least Squares Approach
It is widely accepted that Disclosure Attacks are effective against high-latency anonymous communication systems. A number of Disclosure Attack variants can be found in the litera...
Fernando Pérez-González, Carmela Tro...
CHI
2010
ACM
15 years 6 months ago
Usability and strength in click-based graphical passwords
Click-based graphical passwords have attractive usability properties, such as cueing and good memorability. However, image size and number of click-points in each password signifi...
Elizabeth Stobert
SCN
2008
Springer
142views Communications» more  SCN 2008»
14 years 11 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
IACR
2011
133views more  IACR 2011»
13 years 11 months ago
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings
Barreto-Lynn-Scott (BLS) curves are a stand-out candidate for implementing high-security pairings. This paper shows that particular choices of the pairing-friendly search parameter...
Craig Costello, Kristin Lauter, Michael Naehrig