Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Choi, Joseph I."'
Autor:
Zhao, Lianying, Choi, Joseph I., Demirag, Didem, Butler, Kevin R. B., Mannan, Mohammad, Ayday, Erman, Clark, Jeremy
A one-time program (OTP) works as follows: Alice provides Bob with the implementation of some function. Bob can have the function evaluated exclusively on a single input of his choosing. Once executed, the program will fail to evaluate on any other i
Externí odkaz:
http://arxiv.org/abs/1907.00935
Autor:
Choi, Joseph I., Tian, Dave 'Jing', Hernandez, Grant, Patton, Christopher, Mood, Benjamin, Shrimpton, Thomas, Butler, Kevin R. B., Traynor, Patrick
A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function $f$ of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes $f$ an
Externí odkaz:
http://arxiv.org/abs/1905.01233
Establishing unique identities for both humans and end systems has been an active research problem in the security community, giving rise to innovative machine learning-based authentication techniques. Although such techniques offer an automated meth
Externí odkaz:
http://arxiv.org/abs/1810.00024
Autor:
Choi, Joseph I., Butler, Kevin R. B.
Publikováno v:
Security and Communication Networks.
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits. The traditional enabler of SMC is cryptography, but the significant
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.