Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Raghav Bhaskar"'
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. 35:3619-3631
Publikováno v:
British Journal of Educational Technology. 53:804-821
Privacy-preserving estimation of counts of items in streaming data finds applications in several real-world scenarios including word auto-correction and traffic management applications. Recent works of RAPPOR and Apple's count-mean sketch (CMS) algor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c668cad65114984106f2991e19c89665
Publikováno v:
2021 IEEE International Conference on Big Data (Big Data).
Autor:
Benjamin Zi Hao Zhao, Aviral Agrawal, Mohamed Ali Kaafar, Peter Dickinson, Darren Webb, Catisha Coburn, Raghav Bhaskar, Hassan Jameel Asghar
Publikováno v:
EuroS&P
With an increase in low-cost machine learning APIs, advanced machine learning models may be trained on private datasets and monetized by providing them as a service. However, privacy researchers have demonstrated that these models may leak informatio
Autor:
Raghav Bhaskar, Karthekeyan Chandrasekaran, Y. Yacobi, Peter L. Montgomery, Ramarathnam Venkatesan, Satyanarayana V. Lokam
Publikováno v:
Electronic Notes in Theoretical Computer Science. 197(2):141-148
We show the following:(i)In existing anonymous credential revocation systems, the revocation authority can link the transactions of any user in a subset T of users in O(log|T|) fake failed sessions.(ii)A concern about the DLREP-I anonymous credential
Autor:
Srivatsan Laxman, Jianhua Shao, Benjamin C. M. Fung, Lisa Singh, Kun Liu, Charu C. Aggarwal, Josep Domingo-Ferrer, Adam Smith, Panagiotis Karras, Aleksandra B. Slavkovic, Manolis Terrovitis, Mehmet Sayal, Raghav Bhaskar, Spiros Skiadopoulos, Guenter Karjoth, Wei Jiang, Grigorios Loukides, Aris Gkoulalas-Divanis, Xintao Wu, Daniel Kifer, Ke Wang, Bradley A. Malin, Murat Kantarcioglu, Maria Luisa Damiani, Francesco Bonchi, Philip S. Yu
Publikováno v:
2013 IEEE 13th International Conference on Data Mining Workshops.
Autor:
Prabhanjan Ananth, Raghav Bhaskar
Publikováno v:
Provable Security ISBN: 9783642412264
ProvSec
ProvSec
Security proofs in the Random Oracle Model (ROM) often make use of the fact that the queries made by the adversary to the oracle are observable as well as the responses to those queries can be programmed. While, the issue of programmability of query
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a915c87d9c8f1d06663bca16eed8db99
https://doi.org/10.1007/978-3-642-41227-1_5
https://doi.org/10.1007/978-3-642-41227-1_5
Publikováno v:
Theory of Cryptography ISBN: 9783642365935
TCC
TCC
The Fiat-Shamir paradigm was proposed as a way to remove interaction from 3-round proof of knowledge protocols and derive secure signature schemes. This generic transformation leads to very efficient schemes and has thus grown quite popular. However,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::77677300e54f7956d6bafff43f7f979f
https://doi.org/10.1007/978-3-642-36594-2_12
https://doi.org/10.1007/978-3-642-36594-2_12
Publikováno v:
WISEC
In-network aggregation is a technique employed in Wireless Sensor Networks (WSNs) to aggregate information flowing from the sensor nodes towards the base station. It helps in reducing the communication overhead on the nodes in the network and thereby