Secure two-party computation

Results: 88



#Item
81Secure Computation of Functionalities based on Hamming Distance and its Application to Computing Document Similarity Ayman Jarrous1 and Benny Pinkas2,* 1 2

Secure Computation of Functionalities based on Hamming Distance and its Application to Computing Document Similarity Ayman Jarrous1 and Benny Pinkas2,* 1 2

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2013-09-16 05:33:14
82Fairplay — A Secure Two-Party Computation System Dahlia Malkhi1 , Noam Nisan1 , Benny Pinkas2 , and Yaron Sella1 1 The School of Computer Science and Engineering The Hebrew University of Jerusalem

Fairplay — A Secure Two-Party Computation System Dahlia Malkhi1 , Noam Nisan1 , Benny Pinkas2 , and Yaron Sella1 1 The School of Computer Science and Engineering The Hebrew University of Jerusalem

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-07-02 10:26:47
83Secure Two-Party Computation is Practical Benny Pinkas1 , Thomas Schneider2 , Nigel P. Smart3 , and Stephen C. Williams3 1 2

Secure Two-Party Computation is Practical Benny Pinkas1 , Thomas Schneider2 , Nigel P. Smart3 , and Stephen C. Williams3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-02 03:58:11
84Privacy Preserving Data Mining∗ Yehuda Lindell Department of Computer Science Weizmann Institute of Science Rehovot, Israel. [removed]

Privacy Preserving Data Mining∗ Yehuda Lindell Department of Computer Science Weizmann Institute of Science Rehovot, Israel. [removed]

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-02-17 13:42:09
85Report on DIMACS∗ Working Group on Challenges for Cryptographers in Health Data Privacy Date of working group meeting: June 30, 2004 Working Group Organizers: Benny Pinkas, HP Labs Kobbi Nissim, Microsoft Research

Report on DIMACS∗ Working Group on Challenges for Cryptographers in Health Data Privacy Date of working group meeting: June 30, 2004 Working Group Organizers: Benny Pinkas, HP Labs Kobbi Nissim, Microsoft Research

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-08-16 11:11:48
86Automatic Generation of Two-Party Computations (Extended Abstract) Philip MacKenzie∗

Automatic Generation of Two-Party Computations (Extended Abstract) Philip MacKenzie∗

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-10-23 17:30:48
87Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review

Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-16 05:06:00
88

PDF Document

Add to Reading List

Source URL: u.cs.biu.ac.il

Language: English - Date: 2011-04-04 06:52:20