• Aucun résultat trouvé

[PDF] Top 20 Secure Multi-Party Computation and Privacy

Has 10000 "Secure Multi-Party Computation and Privacy" found on our website. Below are the top 20 most common "Secure Multi-Party Computation and Privacy".

Secure Multi-Party Computation and Privacy

Secure Multi-Party Computation and Privacy

... companies and governments is full of cases where various kinds of private information are valuable ...tendencies and so ...know and trust each other, to communicate securely even in the presence of ... Voir le document complet

167

Communication Locality in Secure Multi-party Computation

Communication Locality in Secure Multi-party Computation

... protocols, and the work of [31] which show polylogarithmic communication for specific ...dell and Pinkas [30]. They design computationally secure MPC protocols for n parties in which one party ... Voir le document complet

21

Dual Protocols for Private Multi-party Matrix Multiplication and Trust Computations

Dual Protocols for Private Multi-party Matrix Multiplication and Trust Computations

... ] and com- pare it to the classical salary sum protocol from [ 35 ] to clarify if the exchanges added by the first make it more secure than the ...undecidable and we have to restrict our analysis to ... Voir le document complet

34

Quantum Primitives for Secure Two-party Computations and Entanglement Attacks

Quantum Primitives for Secure Two-party Computations and Entanglement Attacks

... symmetric multi-error-rate channel which is implemented from discrete memoryless channels by the same construction of Cr´epeau et ...of secure oblivious transfer from these ...of multi-error- rate ... Voir le document complet

144

Information theory for multi-party peer-to-peer communication protocols

Information theory for multi-party peer-to-peer communication protocols

... model, and very close to the model used in the distributed computation community, and, at the same time, does have properties that allow one to analyze protocols in terms of their information ... Voir le document complet

128

Detection of logic flaws in multi-party business applications via security testing

Detection of logic flaws in multi-party business applications via security testing

... of the expected security property, and an integer max. SATMC determines whether the protocol satisfies the expected security property in the scenario by considering up to max execution steps. At the core of SATMC ... Voir le document complet

217

Developing a cloud-based secure computation platform for genomics research

Developing a cloud-based secure computation platform for genomics research

... sharing and GWAS protocols consisted of embarrassingly parallel computations on NTL objects: either iterating over some large, matrix-structured dataset and sequentially processing every row, or MPC batch ... Voir le document complet

88

Practical and Foundational Aspects of Secure Computation

Practical and Foundational Aspects of Secure Computation

... diseases and medication while respecting patient confidentiality? How can an organization insure that the government does not abuse the knowledge that it possesses even though such an organization would be unable ... Voir le document complet

144

Defining Privacy for Weighted Votes, Single and Multi-voter Coercion

Defining Privacy for Weighted Votes, Single and Multi-voter Coercion

... formal privacy definitions for voting protocols are based on observational equiv- alence between two situations where two voters swap their ...outcome and both situations become trivially ...for ... Voir le document complet

30

Secure Multi-Party Matrix Multiplication Based on Strassen-Winograd Algorithm

Secure Multi-Party Matrix Multiplication Based on Strassen-Winograd Algorithm

... Third Party [ 8 ...only and most of the others are generic and transform programs into circuits or use oblivious transfer [ 7 , 26 , 6 , 16 , 23 ...a secure multiparty specific algorithm, ... Voir le document complet

22

Privacy-preserving and secure location authentication

Privacy-preserving and secure location authentication

... protocols and how we can remedy to ...frauds and attacks inspired from the domain distance-bounding protocol and ...threats and give scenarios to justify why they must be taken into account in ... Voir le document complet

128

Bayesian multi-locus pattern selection and computation through reversible jump MCMC

Bayesian multi-locus pattern selection and computation through reversible jump MCMC

... chain, and p, the probabilities of transition from state to state in search space S (transition kernel), the property of reversibility between states x and y holds: π(s) p(s′ | s) = π(s′) p(s | s′) ... Voir le document complet

33

Secure XML-based Network Management in a Multi-source Context

Secure XML-based Network Management in a Multi-source Context

... Figure 3: Netconf message encapsulation Many different access control models have been proposed to protect XML data. Most of them are role-based [8, 1]. These models are recognized to be scalable thanks to differ- ent ... Voir le document complet

13

An Experimental Approach For Information Extraction in Multi-Party Dialogue Discourse

An Experimental Approach For Information Extraction in Multi-Party Dialogue Discourse

... tured and are lacking formatting and ...statistics and topic modeling methods on a real data set containing multi-part dialogue ...other, and contrasting meetings involving the same ... Voir le document complet

15

Transformation Based Routing Overlay for Privacy and Reusability in Multi-Domain IoT

Transformation Based Routing Overlay for Privacy and Reusability in Multi-Domain IoT

... policies and ex- porting them to peering ...content, and the applied and requested ...consumer, and where the leaves correspond to the ... Voir le document complet

9

Privacy Disclosure and Preservation in Learning with Multi-Relational Databases

Privacy Disclosure and Preservation in Learning with Multi-Relational Databases

... for privacy leak- age in such a database, if the full database schema is ...gender) and publicly known statistical data (such as unemployment rates and the number of households in a municipality), or ... Voir le document complet

15

Secure Access Control Architectures for Multi-Tenancy Cloud Environments

Secure Access Control Architectures for Multi-Tenancy Cloud Environments

... Based on the above explanation, for calculating average latency of CloudPolice first we calculate the round trip time of all control packets because CloudPolice generates the control pac[r] ... Voir le document complet

101

RFID Security and Privacy

RFID Security and Privacy

... 2 and 3 are to be submitted to a PIA because it considers that information contained in a level 0 tag are not ...Working Party because tagged items carried by a person contain unique identifiers that could ... Voir le document complet

15

Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks

Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks

... network and all communications pass through it, which means that all packets can be captured by the ...public and secret pairs of keys, enabling it to play the role of any participant in the ...knows ... Voir le document complet

22

Towards Robust and Secure Watermarking

Towards Robust and Secure Watermarking

... Here our approach is the reverse, as we start with a very robust zero-bit watermarking technique 1 , Broken Arrows, and try to increase its security levels. Broken Arrows has been designed for the second contest ... Voir le document complet

8

Show all 10000 documents...