Secure multi-party computation

Results: 221



#Item
151Information / Fairness measure / Transmission Control Protocol / Computing / Cryptographic protocols / Secure multi-party computation / Data

Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness Juan Garay (Bell Labs) Philip MacKenzie (Bell Labs)

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-03-29 11:37:55
152Privacy / Internet privacy / Support vector machine / Ranking / Secure multi-party computation / Ranking SVM / Statistics / Data analysis / Data mining

Privacy-Preserving Ranking over Vertically Partitioned Data Keivan Kianmehr Negar Koochakzadeh

Add to Reading List

Source URL: www.edbt.org

Language: English - Date: 2012-02-02 04:27:38
153OPTICS algorithm / DBSCAN / Quantum information science / Cluster analysis / XTR / Public-key cryptography / Secure multi-party computation / Communication complexity / Statistics / Cryptography / Applied mathematics

Privacy Preserving Distributed DBSCAN Clustering∗ Jinfei Liu Jun Luo University of Science and

Add to Reading List

Source URL: www.edbt.org

Language: English - Date: 2012-02-01 19:52:54
154Universal composability / Communications protocol / Secure multi-party computation / IP / Port / Proof of knowledge / Zero-knowledge proof / Commitment scheme / X Window System / Cryptography / Cryptographic protocols / Data

Efficient and Universally Composable Committed Oblivious Transfer and Applications∗ Juan A. Garay† Philip MacKenzie†

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-02-22 16:48:33
155Online chat / Cryptographic protocols / Public-key cryptography / Secure multi-party computation / Internet privacy / Social software / Internet / Email / Privacy / Cryptography / Technology / Computing

1 Secure Friend Discovery in Mobile Social Networks Wei Dong Vacha Dave Lili Qiu Yin Zhang The University of Texas at Austin

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2011-03-04 13:47:50
156Data types / Cryptographic protocols / Inter-process communication / Models of computation / Smalltalk / Lambda calculus / Variable / Alice and Bob / Secure multi-party computation / Computing / Software engineering / Computer programming

Capability-based Financial Instruments 1 Mark S. Miller , Chip Morningstar2, Bill Frantz2 1

Add to Reading List

Source URL: erights.org

Language: English - Date: 2004-05-18 05:27:32
157Bloom filter / Hashing / Set / Secure multi-party computation / Bit array / Multiset / Filter / Intersection / Cardinality / Mathematics / Mathematical logic / Binary operations

Fast Private Set Operations with SEPIA Dilip Many [removed] Martin Burkhart [removed]

Add to Reading List

Source URL: sepia.ee.ethz.ch

Language: English - Date: 2012-03-01 14:38:01
158Dolev-Yao model / Communications protocol / Computer security / Cryptographic primitive / Information-theoretic security / Cryptography / Cryptographic protocols / Secure multi-party computation

ZISC annual report[removed]

Add to Reading List

Source URL: www.zisc.ethz.ch

Language: English - Date: 2015-02-14 14:43:29
159Telecommunications engineering / Secure multi-party computation / Computing / Radio-frequency identification / Cryptography / ZigBee / Technology / Cryptographic protocols / Wireless

ZISC annual Report[removed]

Add to Reading List

Source URL: www.zisc.ethz.ch

Language: English - Date: 2015-02-14 02:11:49
160RSA problem / RSA / Secure multi-party computation / Ueli Maurer / Key / Computational complexity theory / Lattice problem / Cryptography / Public-key cryptography / Key management

ZISC Annual Report[removed] [removed]ZISC Annual Report[removed]

Add to Reading List

Source URL: www.zisc.ethz.ch

Language: English - Date: 2015-02-14 00:57:50
UPDATE