Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Nishat Koti"'
Autor:
Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2023:24-42
Secure shuffle is an important primitive that finds use in several applications such as secure electronic voting, oblivious RAMs, secure sorting, to name a few. For time-sensitive shuffle-based applications that demand a fast response time, it is ess
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2023:23-39
Identifying a cluster around a seed node in a graph, termed local clustering, finds use in several applications, including fraud detection, targeted advertising, community detection, etc. However, performing local clustering is challenging when the g
Publikováno v:
Proceedings of the ACM Web Conference 2023.
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Autor:
Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Publikováno v:
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229626
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9aa5e97fd09adff41406c8149b168457
https://doi.org/10.1007/978-3-031-22963-3_19
https://doi.org/10.1007/978-3-031-22963-3_19
Publikováno v:
Koti, N, Suresh, A, Rachuri, S R & Patra, A 2022, ' Tetrad : Actively Secure 4PC for Secure Training and Inference ', Paper presented at Network and Distributed Systems Security (NDSS) Symposium 2022, San Diego,Calif., United States, 24/04/2022-28/04/2022 . https://doi.org/10.14722/ndss.2022.24058
Mixing arithmetic and boolean circuits to perform privacy-preserving machine learning has become increasingly popular. Towards this, we propose a framework for the case of four parties with at most one active corruption called Tetrad. Tetrad works ov
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d90450b59e3ab203d09de9e0364e2e83
https://pure.au.dk/portal/da/publications/tetrad(13bd7768-cfe5-47ae-aa6d-c5d1078324f5).html
https://pure.au.dk/portal/da/publications/tetrad(13bd7768-cfe5-47ae-aa6d-c5d1078324f5).html
The growing volumes of data being collected and its analysis to provide better services are creating worries about digital privacy. To address privacy concerns and give practical solutions, the literature has relied on secure multiparty computation t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::06586e9e05128f84a035d67b629f17c3
Autor:
B. R. Purushothama, Nishat Koti
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811033759
While providing access control in a hierarchical access structure, a partially ordered set of security classes can be used to depict an access hierarchy. Data accessible to descendants of a particular security class should also be accessible to the u
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::df278358e684af8f68bdfb275f053f24
https://doi.org/10.1007/978-981-10-3376-6_18
https://doi.org/10.1007/978-981-10-3376-6_18