Back to Results
First PageMeta Content
Interval tree / Binary tree / Data management / Computing / Data / Data privacy / Differential privacy / Internet privacy


Privacy-Preserving Stream Aggregation with Fault Tolerance T-H. Hubert Chan1 , Elaine Shi2 , and Dawn Song2 1 The University of Hong Kong
Add to Reading List

Document Date: 2012-01-09 04:42:56


Open Document

File Size: 379,96 KB

Share Result on Facebook

Company

ESPN / Microsoft / /

Facility

University of Hong Kong / /

IndustryTerm

real-world applications / by-product / setup algorithm / summation protocol / smart grid operator / cloud server / smart sensing applications / electricity consumption / aggregation algorithm / decryption algorithm / realworld applications / cloud computing / healthcare providers / crypto-systems / /

Organization

UC Berkeley / University of Hong Kong / /

Person

Geom / /

Position

Prime Minister / market researcher / trusted dealer / trusted curator / /

ProgrammingLanguage

C / /

Technology

encryption / 4 4.1 Binary Protocol / cryptography / summation protocol / Binary Protocol / one-time setup algorithm / randomized protocol / 4.3 Binary Protocol / peer-to-peer / name Binary Protocol / setup algorithm / secret key / decryption algorithm / aggregation algorithm / /

SocialTag