咨询与建议

限定检索结果

文献类型

  • 10 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 18 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 3 篇 电气工程
    • 3 篇 信息与通信工程
    • 1 篇 网络空间安全
  • 7 篇 理学
    • 7 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 18 篇 oblivious algori...
  • 2 篇 parallel algorit...
  • 2 篇 gpgpu
  • 2 篇 comparator netwo...
  • 2 篇 cuda
  • 2 篇 bulk execution
  • 2 篇 secure computati...
  • 1 篇 secret sharing
  • 1 篇 programming lang...
  • 1 篇 zero-one princip...
  • 1 篇 circle graphs
  • 1 篇 routing
  • 1 篇 graph algorithms
  • 1 篇 distributed-memo...
  • 1 篇 floyd-warshall a...
  • 1 篇 models of comput...
  • 1 篇 symmetric compar...
  • 1 篇 secure multi-par...
  • 1 篇 bimatrix games
  • 1 篇 sorting

机构

  • 2 篇 univ maryland co...
  • 2 篇 technion israel ...
  • 1 篇 univ brasilia de...
  • 1 篇 aarhus univ dept...
  • 1 篇 univ waterloo wa...
  • 1 篇 computer science...
  • 1 篇 carleton univ sc...
  • 1 篇 csail mit united...
  • 1 篇 indiana univ blo...
  • 1 篇 univ waterloo de...
  • 1 篇 univ karlskona s...
  • 1 篇 univ padua dept ...
  • 1 篇 hku peoples r ch...
  • 1 篇 tech univ eindho...
  • 1 篇 umd college pk m...
  • 1 篇 technicolor los ...
  • 1 篇 carnegie mellon ...
  • 1 篇 hiroshima univ d...
  • 1 篇 hiroshima univ d...
  • 1 篇 facebook ny usa

作者

  • 4 篇 shi elaine
  • 3 篇 nayak kartik
  • 3 篇 wang xiao shaun
  • 2 篇 ito yasuaki
  • 2 篇 huang yan
  • 2 篇 levi tamir
  • 2 篇 chan t-h hubert
  • 2 篇 litman ami
  • 2 篇 nakano koji
  • 2 篇 liu chang
  • 2 篇 takafuji daisuke
  • 1 篇 wirth anthony
  • 1 篇 lópez-ortiz a
  • 1 篇 bordim jacir
  • 1 篇 bose p
  • 1 篇 cormen thomas h.
  • 1 篇 papadimitriou ch...
  • 1 篇 pucci geppino
  • 1 篇 holland william
  • 1 篇 de vreede niels

语言

  • 17 篇 英文
  • 1 篇 其他
检索条件"主题词=Oblivious Algorithms"
18 条 记 录,以下是1-10 订阅
排序:
Network-oblivious algorithms
收藏 引用
JOURNAL OF THE ACM 2016年 第1期63卷 3-3页
作者: Bilardi, Gianfranco Pietracaprina, Andrea Pucci, Geppino Scquizzato, Michele Silvestri, Francesco Univ Padua Dept Informat Engn I-35131 Padua Italy Univ Padua I-35131 Padua Italy
A framework is proposed for the design and analysis of network-oblivious algorithms, namely algorithms that can run unchanged, yet efficiently, on a variety of machines characterized by different degrees of parallelis... 详细信息
来源: 评论
Waks-On/Waks-Off: Fast oblivious Offline/Online Shuffling and Sorting with Waksman Networks  23
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling an...
收藏 引用
30th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Sasy, Sajin Johnson, Aaron Goldberg, Ian Univ Waterloo Waterloo ON Canada US Naval Res Lab Washington DC USA
As more privacy-preserving solutions leverage trusted execution environments (TEEs) like Intel SGX, it becomes pertinent that these solutions can by design thwart TEE side-channel attacks that research has brought to ... 详细信息
来源: 评论
Advanced Composition Theorems for Differential obliviousness  15
Advanced Composition Theorems for Differential Obliviousness
收藏 引用
15th Innovations in Theoretical Computer Science Conference (ITCS)
作者: Zhou, Mingxun Zhao, Mengshi Chan, T-H Hubert Shi, Elaine Carnegie Mellon Univ Pittsburgh PA 15213 USA Univ Hong Kong Hong Kong Peoples R China
Differential obliviousness (DO) is a privacy notion which mandates that the access patterns of a program satisfy differential privacy. Earlier works have shown that in numerous applications, differential obliviousness... 详细信息
来源: 评论
oblivious Stacking and MAX k-CUT for Circle Graphs  13th
Oblivious Stacking and MAX k-CUT for Circle Graphs
收藏 引用
13th International Conference on Computational Logistics (ICCL)
作者: Olsen, Martin Aarhus Univ Dept Business Dev & Technol Aarhus Denmark
Stacking is an important process within logistics. Some notable examples of items to be stacked are steel bars or steel plates in a steel yard or containers in a container terminal or on a ship. We say that two items ... 详细信息
来源: 评论
Efficient oblivious Permutation via the Waksman Network  22
Efficient Oblivious Permutation via the Waksman Network
收藏 引用
17th ACM ASIA Conference on Computer and Communications Security 2022 (ACM ASIACCS)
作者: Holland, William Ohrimenko, Olga Wirth, Anthony Univ Melbourne Sch Comp & Informat Syst Melbourne Vic Australia
Memory accesses to data stored on an untrusted server are known to leak information, even if the data is encrypted. The oblivious permutation (OP) is a key primitive for algorithms and protocols that are designed to h... 详细信息
来源: 评论
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals  18th
A Practical Approach to the Secure Computation of the Moore-...
收藏 引用
18th International Conference on Applied Cryptography and Network Security (ACNS)
作者: Bouman, Niek J. de Vreede, Niels Roseman Labs Breda Netherlands Tech Univ Eindhoven Eindhoven Netherlands
Solving linear systems of equations is a universal problem. In the context of secure multiparty computation (MPC), a method to solve such systems, especially for the case in which the rank of the system is unknown and... 详细信息
来源: 评论
Private and oblivious set and multiset operations
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2016年 第5期15卷 493-518页
作者: Blanton, Marina Aguiar, Everaldo Univ Notre Dame Dept Comp Sci & Engn Notre Dame IN 46556 USA
Privacy-preserving set operations are a popular research topic. Despite a large body of literature, the great majority of the available solutions are two-party protocols and expect that each participant knows her inpu... 详细信息
来源: 评论
C2CU: a CUDA C program generator for bulk execution of a sequential algorithm
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2017年 第17期29卷
作者: Takafuji, Daisuke Nakano, Koji Ito, Yasuaki Bordim, Jacir Hiroshima Univ Dept Informat Engn Kagamiyama 1-4-1 Higashihiroshima 7398527 Japan Univ Brasilia Dept Comp Sci Brasilia DF Brazil
Several important tasks, including matrix computation, signal processing, sorting, dynamic programming, encryption, and decryption, can be performed by oblivious sequential algorithms. A sequential algorithm is oblivi... 详细信息
来源: 评论
GraphSC: Parallel Secure Computation Made Easy  36
GraphSC: Parallel Secure Computation Made Easy
收藏 引用
IEEE Symposium on Security and Privacy SP
作者: Nayak, Kartik Wang, Xiao Shaun Ioannidis, Stratis Weinsberg, Udi Taft, Nina Shi, Elaine Univ Maryland College Pk MD 20742 USA Yahoo Sunnyvale CA USA Facebook New York NY USA Google New York NY USA Technicolor Los Altos CA USA
We propose introducing modern parallel programming paradigms to secure computation, enabling their secure execution on large datasets. To address this challenge, we present GraphSC, a framework that (i) provides a pro... 详细信息
来源: 评论
ObliVM: A Programming Framework for Secure Computation  36
ObliVM: A Programming Framework for Secure Computation
收藏 引用
IEEE Symposium on Security and Privacy SP
作者: Liu, Chang Wang, Xiao Shaun Nayak, Kartik Huang, Yan Shi, Elaine Univ Maryland College Pk MD 20742 USA Indiana Univ Bloomington IN 47405 USA
We design and develop ObliVM, a programming framework for secure computation. ObliVM offers a domain-specific language designed for compilation of programs into efficient oblivious representations suitable for secure ... 详细信息
来源: 评论