Oblivious

Results: 327



#Item
81

FUNCTIONALLY OBLIVIOUS (AND SUCCINCT) Edward Kmett BUILDING BETTER TOOLS

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2015-07-21 03:23:09
    82

    Secure indexes and other oblivious search structures (Privaatne otsing: indeksid ning alternatiivid) Sven Laur

    Add to Reading List

    Source URL: lepo.it.da.ut.ee

    Language: English - Date: 2004-10-06 09:55:47
      83

      A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer∗ Shota Goto1 , and Junji Shikata1,2 1 2

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-09-30 04:26:35
        84Cryptography / Commitment scheme / Public-key cryptography / Secret sharing / Power dividers and directional couplers / Oblivious transfer / Private information retrieval / NC

        LNCSRobuster Combiners for Oblivious Transfer

        Add to Reading List

        Source URL: dcg.ethz.ch

        Language: English - Date: 2014-09-26 08:36:33
        85

        Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents Vandana Gunupudi1 and Stephen R. Tate2 1

        Add to Reading List

        Source URL: nsl.cse.unt.edu

        Language: English - Date: 2012-01-12 18:51:22
          86

          Oblivious Printing of Secret Messages in a Multi-party Setting Aleksander Essex and Urs Hengartner Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 2G1

          Add to Reading List

          Source URL: fc12.ifca.ai

          Language: English - Date: 2012-02-18 14:34:57
            87

            CCCG 2014, Halifax, Nova Scotia, August 11–13, 2013 The Mutual Visibility Problem for Oblivious Robots Giuseppe Antonio Di Luna∗ Paola Flocchini†

            Add to Reading List

            Source URL: giovanniviglietta.com

            Language: English - Date: 2014-08-14 15:03:28
              88

              A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer∗ Shota Goto1 , and Junji Shikata1,2 1 2

              Add to Reading List

              Source URL: www.slab.ynu.ac.jp

              Language: English - Date: 2015-09-12 09:52:08
                89

                Protocol-Oblivious Forwarding: Unleash the Power of SDN through a Future-Proof Forwarding Plane Haoyu Song Huawei Technologies, USA Santa Clara, CA, 95050

                Add to Reading List

                Source URL: conferences.sigcomm.org

                Language: English - Date: 2013-07-08 16:03:16
                  90

                  Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification Marina Blanton and Siddharth Saraph Department of Computer Science and Engineering University of Notre Dame mblan

                  Add to Reading List

                  Source URL: www.cse.nd.edu

                  Language: English - Date: 2015-08-26 15:51:53
                    UPDATE