Sciweavers

6861 search results - page 181 / 1373
» Security for Ubiquitous Computing
Sort
View
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 10 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
IEEESP
2010
91views more  IEEESP 2010»
15 years 1 months ago
Security and Privacy Challenges in Cloud Computing Environments
Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn
FC
2005
Springer
83views Cryptology» more  FC 2005»
15 years 10 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...
149
Voted
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
15 years 8 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa
FOCS
2006
IEEE
15 years 10 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...