Sciweavers

129 search results - page 13 / 26
» Symmetrically Private Information Retrieval
Sort
View
111
Voted
NDSS
2008
IEEE
15 years 6 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
ISW
2005
Springer
15 years 6 months ago
An Oblivious Transfer Protocol with Log-Squared Communication
Abstract. We propose a one-round 1-out-of-n computationally-private information retrieval protocol for -bit strings with low-degree polylogarithmic receivercomputation, linear send...
Helger Lipmaa
79
Voted
ANOR
2002
92views more  ANOR 2002»
15 years 8 days ago
Nash Equilibrium and Subgame Perfection in Observable Queues
A subgame perfection refinement of Nash equilibrium is suggested for games of the following type: each of an infinite number of identical players selects an action using his privat...
Refael Hassin, Moshe Haviv
119
Voted
COMCOM
2010
148views more  COMCOM 2010»
14 years 9 months ago
Privacy versus scalability in radio frequency identification systems
Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-o...
Basel Alomair, Radha Poovendran
105
Voted
GLOBECOM
2007
IEEE
15 years 6 months ago
Achievable Rates for the Gaussian Interference Relay Channel
—In this paper, an interference relay channel where two independent sources communicate with two destinations by the help of a relay is studied. The relay is full-duplex and emplo...
Onur Sahin, Elza Erkip