Oblivious

Results: 327



#Item
291Internet protocols / Data / Private information retrieval / Oblivious transfer / Port / X Window System / Internet privacy / Cryptographic protocols / Computing / Software

Keyword Search and Oblivious Pseudorandom Functions Michael J. Freedman1 , Yuval Ishai2 , Benny Pinkas3 , and Omer Reingold4 1 New York University ([removed])

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-12-05 02:46:25
292Cryptography / Computing / Secure two-party computation / Communications protocol / Commitment scheme / Secure multi-party computation / Oblivious transfer / Port / Transmission Control Protocol / Cryptographic protocols / Data / Information

Secure Computation of Functionalities based on Hamming Distance and its Application to Computing Document Similarity Ayman Jarrous1 and Benny Pinkas2,* 1 2

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2013-09-16 05:33:14
293Cryptographic protocols / Computational complexity theory / IP / Homomorphic encryption / Paillier cryptosystem / Communication complexity / One-way function / Polynomial / Oblivious transfer / Cryptography / Theoretical computer science / Applied mathematics

Efficient Private Matching and Set Intersection Michael J. Freedman1? , Kobbi Nissim2?? , and Benny Pinkas3 1 2

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-05-12 12:29:04
294Decision trees / Theoretical computer science / Secure multi-party computation / ID3 algorithm / Decision tree learning / ID3 / Secure two-party computation / Communication complexity / Oblivious transfer / Cryptographic protocols / Data / Information

Privacy Preserving Data Mining∗ Yehuda Lindell Department of Computer Science Weizmann Institute of Science Rehovot, Israel. [removed]

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-02-17 13:42:09
295Cryptographic protocols / ID-based encryption / Public key infrastructure / Digital signature / ElGamal encryption / Semantic security / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Key management

Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik, School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA {ccastell,stasio,gts}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 19:57:06
296Secure multi-party computation / Internet privacy / Information privacy / Oblivious transfer / Cryptographic protocols / Ethics / Privacy

Privacy-Preserving Methods for Sharing Financial Risk Exposures∗ Emmanuel A. Abbe,1,2 Amir E. Khandani,3 Andrew W. Lo2,3,4∗ 1 EPFL School of Communication and Computer Sciences

Add to Reading List

Source URL: www.argentumlux.org

Language: English - Date: 2011-12-14 10:13:24
297Data / Information / Oblivious transfer / Database / Cache / Advantage / Replication / Server / Hash table / Cryptographic protocols / Private information retrieval / Computing

International Journal of Information Security manuscript No. (will be inserted by the editor) Xuhua Ding · Yanjiang Yang · Robert H. Deng · Shuhong Wang A New Hardware-assisted PIR with O(n) Shuffle Cost

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2010-04-15 23:16:19
298Utah State Legislature

OBLIVIOUS SUBTITLE HANS G EHRBAR, [removed]For Utah, the intensification of the climate crisis means fires, droughts, and sand storms. Water is the most critical resource for Utah’s quality of life in the next two deca

Add to Reading List

Source URL: lists.econ.utah.edu

Language: English - Date: 2013-06-30 09:33:40
    299YAK / Secure two-party computation / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptographic protocols / Data / Information

    Automatic Generation of Two-Party Computations (Extended Abstract) Philip MacKenzie∗

    Add to Reading List

    Source URL: www.cs.cmu.edu

    Language: English - Date: 2004-10-23 17:30:48
    UPDATE