×

Found 106 Documents (Results 1–100)

PAC privacy: automatic privacy measurement and control of data processing. (English) Zbl 1531.94083

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14082, 611-644 (2023).

SecureBiNN: 3-party secure computation for binarized neural network inference. (English) Zbl 1524.68307

Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13556, 275-294 (2022).
Full Text: DOI

Brief announcement: Optimally-resilient unconditionally-secure asynchronous multi-party computation revisited. (English) Zbl 1540.68028

Attiya, Hagit (ed.), 34th international symposium on distributed computing, DISC 2020, virtual conference, October 12–16, 2020. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 179, Article 44, 3 p. (2020).
Full Text: DOI

On private information retrieval supporting range queries. (English) Zbl 1511.68044

Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12309, 674-694 (2020).
Full Text: DOI

Pine: enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment. (English) Zbl 1524.68044

Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12308, 3-22 (2020).

Formalizing and proving privacy properties of voting protocols using alpha-beta privacy. (English) Zbl 1496.68136

Sako, Kazue (ed.) et al., Computer security – ESORICS 2019. 24th European symposium on research in computer security, Luxembourg, September 23–27, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11735, 535-555 (2019).
MSC:  68P27 94A60

Efficient secure multi-party protocols for decision tree classification. (English) Zbl 1443.68039

Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 362-380 (2019).
Full Text: DOI

Anonymous single-sign-on for \(n\) designated services with traceability. (English) Zbl 1496.68064

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 470-490 (2018).
MSC:  68M25 68P27 94A62

Attribute-based encryption with expressive and authorized keyword search. (English) Zbl 1386.94068

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 106-126 (2017).
MSC:  94A60

Efficient encrypted keyword search for multi-user data sharing. (English) Zbl 1499.68094

Askoxylakis, Ioannis (ed.) et al., Computer security – ESORICS 2016. 21st European symposium on research in computer security, Heraklion, Greece, September 26–30, 2016. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9878, 173-195 (2016).
Full Text: DOI

Cryptographic technology for benefiting from Big Data. (English) Zbl 1326.94096

Wakayama, Masato (ed.) et al., The impact of applications on mathematics. Proceedings of the Forum of Mathematics for Industry, “Math-for-Industry 2013”, Fukuoka, Japan, November 4–8, 2013. Tokyo: Springer (ISBN 978-4-431-54906-2/hbk; 978-4-431-54907-9/ebook). Mathematics for Industry 1, 85-95 (2014).
Full Text: DOI

A privacy-aware protocol for sociometric questionnaires. (English) Zbl 1247.91167

Hlinený, Petr (ed.) et al., Annual doctoral workshop on mathematical and engineering methods in computer science (MEMICS’09). Selected papers based on the presentations at the workshop, November 13-15, 2009, Znojmo, Czech Republic. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-15-6). OASIcs – OpenAccess Series in Informatics 13, 1-9, electronic only (2009).
MSC:  91E45 05C90 68P25
Full Text: DOI

A shared steganographic file system with error correction. (English) Zbl 1178.68223

Torra, Vicenç (ed.) et al., Modeling decisions for artificial intelligence. 5th international conference, MDAI 2008, Sabadell, Spain, October 30–31, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88268-8/pbk). Lecture Notes in Computer Science 5285. Lecture Notes in Artificial Intelligence, 227-238 (2008).
MSC:  68P25
Full Text: DOI

Supertrust, a secure and efficient framework for handling trust in super-peer networks. (English) Zbl 1283.68090

Proceedings of the 26th annual ACM symposium on principles of distributed computing, PODC ’07, Portland, OR, USA, August 12–15, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-616-5). 374-375 (2007).
MSC:  68M14 94A60 68P20
Full Text: DOI

Privacy-preserving collaborative association rule mining. (English) Zbl 1158.68385

Jajodia, Sushil (ed.) et al., Data and applications security XIX. 19th annual IFIP WG 11.3 working conference on data and applications security, Storrs, CT, USA, August 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28138-X/pbk). Lecture Notes in Computer Science 3654, 153-165 (2005).
MSC:  68P25 68T05
Full Text: DOI

Verifiable shuffles: a formal model and a Paillier-based efficient construction with provable security. (English) Zbl 1103.68533

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 61-75 (2004).
MSC:  68P25 94A60 94A62
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software