Oblivious

Results: 327



#Item
231Rare Time Series Motif Discovery from Unbounded Streams Nurjahan Begum Eamonn Keogh

Rare Time Series Motif Discovery from Unbounded Streams Nurjahan Begum Eamonn Keogh

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-09-10 17:59:50
232PBLCACHE  A client side persistent block cache for the data center Vault Boston[removed]Luis Pabón - Red Hat

PBLCACHE A client side persistent block cache for the data center Vault Boston[removed]Luis Pabón - Red Hat

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2015-03-05 14:44:13
233Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar1 , Payman Mohassel1 , Benny Pinkas2? , and Ben Riva2,3?? 1  University of Calgary

Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar1 , Payman Mohassel1 , Benny Pinkas2? , and Ben Riva2,3?? 1 University of Calgary

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-25 05:51:56
234Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption∗ Jonathan Katz† Aishwarya Thiruvengadam‡

Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption∗ Jonathan Katz† Aishwarya Thiruvengadam‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 12:50:07
235Hardware-Oblivious Parallelism for In-Memory Column-Stores Max Heimel Technische Universitat ¨ Berlin

Hardware-Oblivious Parallelism for In-Memory Column-Stores Max Heimel Technische Universitat ¨ Berlin

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2013-08-01 05:50:47
236The Simplest Protocol for Oblivious Transfer Tung Chou1 and Claudio Orlandi2 1 Technische Universieit Eindhoven 2

The Simplest Protocol for Oblivious Transfer Tung Chou1 and Claudio Orlandi2 1 Technische Universieit Eindhoven 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 06:07:01
237Fair Blind Signatures Markus Stadler1 , Jean-Marc Piveteau2 , Jan Camenisch1 1 Institute for Theoretical Computer Science ETH Zurich

Fair Blind Signatures Markus Stadler1 , Jean-Marc Piveteau2 , Jan Camenisch1 1 Institute for Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: www.ubilab.org

Language: English - Date: 2013-09-04 09:24:20
238Theory Comput Syst[removed]: 269–296 DOI[removed]s00224[removed]Optimal Cache-Oblivious Mesh Layouts Michael A. Bender · Bradley C. Kuszmaul · Shang-Hua Teng · Kebin Wang

Theory Comput Syst[removed]: 269–296 DOI[removed]s00224[removed]Optimal Cache-Oblivious Mesh Layouts Michael A. Bender · Bradley C. Kuszmaul · Shang-Hua Teng · Kebin Wang

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2015-02-18 01:45:02
2394-3 A Survey on Oblivious Transfer Protocols Le Trieu Phong In this paper, we survey some constructions of oblivious transfer (OT) protocols from public key encryption schemes. We begin with a simple construction of 1-o

4-3 A Survey on Oblivious Transfer Protocols Le Trieu Phong In this paper, we survey some constructions of oblivious transfer (OT) protocols from public key encryption schemes. We begin with a simple construction of 1-o

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:07:55
2403-6 T  oward Realizing Privacy-Preserving IP-Traceback NOJIMA Ryo The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems hav

3-6 T  oward Realizing Privacy-Preserving IP-Traceback NOJIMA Ryo The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems hav

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2012-03-11 23:15:00