Sciweavers

176 search results - page 19 / 36
» The Cost of Privatization
Sort
View
EUROCRYPT
2008
Springer
15 years 1 months ago
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
In the model of perfectly secure message transmission schemes (PSMTs), there are n channels between a sender and a receiver. An infinitely powerful adversary A may corrupt (observe...
Kaoru Kurosawa, Kazuhiro Suzuki
CORR
2010
Springer
92views Education» more  CORR 2010»
14 years 12 months ago
Efficient System-Enforced Deterministic Parallelism
Deterministic execution offers many benefits for debugging, fault tolerance, and security. Current methods of executing parallel programs deterministically, however, often incur h...
Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford
CORR
2012
Springer
217views Education» more  CORR 2012»
13 years 7 months ago
An Adaptive Mechanism for Accurate Query Answering under Differential Privacy
We propose a novel mechanism for answering sets of counting queries under differential privacy. Given a workload of counting queries, the mechanism automatically selects a differ...
Chao Li, Gerome Miklau
WCNC
2008
IEEE
15 years 6 months ago
Anonymous ID-Based Group Key Agreement for Wireless Networks
—Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID...
Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel
PODC
2004
ACM
15 years 5 months ago
On the expected payment of mechanisms for task allocation
We study a representative task allocation problem called shortest paths: Let G be a graph in which the edges are owned by self interested agents. The cost of each edge is privatel...
Artur Czumaj, Amir Ronen