咨询与建议

限定检索结果

文献类型

  • 21 篇 期刊文献
  • 11 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 33 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 28 篇 计算机科学与技术...
    • 13 篇 电气工程
    • 4 篇 信息与通信工程
    • 3 篇 软件工程
    • 1 篇 电子科学与技术(可...
  • 11 篇 理学
    • 10 篇 数学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 33 篇 private computat...
  • 6 篇 private informat...
  • 6 篇 randomness
  • 3 篇 secure multi-par...
  • 3 篇 information-theo...
  • 3 篇 lower bounds
  • 2 篇 capacity
  • 2 篇 reed-solomon cod...
  • 2 篇 homomorphic encr...
  • 2 篇 secure function ...
  • 2 篇 fully homomorphi...
  • 2 篇 connectivity
  • 2 篇 encrypted comput...
  • 2 篇 private inferenc...
  • 1 篇 symmetric privat...
  • 1 篇 auditing and acc...
  • 1 篇 graph connectivi...
  • 1 篇 privacy-enhancin...
  • 1 篇 data privacy
  • 1 篇 runtime verifica...

机构

  • 3 篇 technion israel ...
  • 2 篇 univ waterloo wa...
  • 2 篇 simula uib n-500...
  • 2 篇 new jersey inst ...
  • 2 篇 univ texas dept ...
  • 1 篇 alan turing inst...
  • 1 篇 univ north texas...
  • 1 篇 bell commun res ...
  • 1 篇 med univ lubeck ...
  • 1 篇 the department o...
  • 1 篇 univ calif los a...
  • 1 篇 washington univ ...
  • 1 篇 technion haifa
  • 1 篇 univ twente dept...
  • 1 篇 acad sinica inst...
  • 1 篇 indian inst tech...
  • 1 篇 worcester polyte...
  • 1 篇 mit eecs dept 77...
  • 1 篇 univ alberta edm...
  • 1 篇 cnrs

作者

  • 3 篇 raviv netanel
  • 3 篇 kushilevitz e
  • 2 篇 jakoby andreas
  • 2 篇 gál a
  • 2 篇 obead sarah a.
  • 2 篇 duddu vasisht
  • 2 篇 rosnes eirik
  • 2 篇 liskiewicz macie...
  • 2 篇 bitar rawad
  • 2 篇 sun hua
  • 2 篇 rosén a
  • 2 篇 lin hsuan-yin
  • 2 篇 tang xiaohu
  • 2 篇 manthey bodo
  • 2 篇 zhu jinbao
  • 2 篇 blaeser markus
  • 2 篇 kliewer jorg
  • 1 篇 asokan n.
  • 1 篇 hsu tsan-sheng
  • 1 篇 gizem s. cetin

语言

  • 33 篇 英文
检索条件"主题词=Private computation"
33 条 记 录,以下是11-20 订阅
排序:
Juliet: A Configurable Processor for Computing on Encrypted Data
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2024年 第9期73卷 2335-2349页
作者: Gouert, Charles Mouris, Dimitris Tsoutsos, Nektarios Georgios Univ Delaware Dept Elect & Comp Engn Newark DE 19716 USA
Fully homomorphic encryption (FHE) has become progressively more viable in the years since its original inception in 2009. At the same time, leveraging state-of-the-art schemes in an efficient way for general computat... 详细信息
来源: 评论
private Inference in Quantized Models
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2025年 第5期71卷 3957-3973页
作者: Deng, Zirui Ramkumar, Vinayak Bitar, Rawad Raviv, Netanel Washington Univ St Louis Dept Comp Sci & Engn St Louis MO 63130 USA Tel Aviv Univ Dept Elect Engn Syst IL-6997801 Tel Aviv Israel Tech Univ Munich Inst Commun Engn D-80333 Munich Germany
A typical setup in many machine learning scenarios involves a server that holds a model and a user that possesses data, and the challenge is to perform inference while safeguarding the privacy of both parties. private... 详细信息
来源: 评论
Randomness in private Sequential Stateless Protocols  30th
Randomness in Private Sequential Stateless Protocols
收藏 引用
30th International Conference on the Theory and Application of Cryptology and Information Security
作者: Anilkumar, Hari Krishnan P. Narayanan, Varun Prabhakaran, Manoj Prabhakaran, Vinod M. TIFR Mumbai Maharashtra India Univ Calif Los Angeles Los Angeles CA USA Indian Inst Technol Mumbai Maharashtra India
A significant body of work in information-theoretic cryptography has been devoted to the fundamental problem of understanding the power of randomness in private computation. This has included both in-depth study of th... 详细信息
来源: 评论
Attesting Distributional Properties of Training Data for Machine Learning  29th
Attesting Distributional Properties of Training Data for Mac...
收藏 引用
29th European Symposium on Research in Computer Security (ESORICS)
作者: Duddu, Vasisht Das, Anudeep Khayata, Nora Yalame, Hossein Schneider, Thomas Asokan, N. Univ Waterloo Waterloo ON Canada Tech Univ Darmstadt Darmstadt Germany
The success of machine learning (ML) has been accompanied by increased concerns about its trustworthiness. Several jurisdictions are preparing ML regulatory frameworks. One such concern is ensuring that model training... 详细信息
来源: 评论
SoK: Privacy-Preserving Computing in the Blockchain Era  7
SoK: Privacy-Preserving Computing in the Blockchain Era
收藏 引用
7th IEEE European Symposium on Security and Privacy (IEEE EuroS and P)
作者: Almashaqbeh, Ghada Solomon, Ravital Univ Connecticut Storrs CT 06269 USA Sunscreen San Francisco CA USA
Privacy is a huge concern for cryptocurrencies and blockchains as most of these systems log everything in the clear. This has resulted in several academic and industrial initiatives to address privacy. Starting with t... 详细信息
来源: 评论
Information Theoretic private Inference in Quantized Models
Information Theoretic Private Inference in Quantized Models
收藏 引用
IEEE International Symposium on Information Theory (ISIT)
作者: Raviv, Netanel Bitar, Rawad Yaakobi, Eitan Washington Univ Dept Comp Sci & Engn St Louis MO 14263 USA Tech Univ Munich Inst Comp Engn Munich Germany Technion Israel Inst Technol Dept Comp Sci Haifa Israel
In a private Inference scenario, a server holds a model (e.g., a neural network), a user holds data, and the user wishes to apply the model on her data. The privacy of both parties must be protected;the user's dat... 详细信息
来源: 评论
Homomorphic Sorting With Better Scalability
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2021年 第4期32卷 760-771页
作者: Cetin, Gizem S. Savas, Erkay Sunar, Berk Worcester Polytech Inst Dept Elect & Comp Engn Worcester MA 01609 USA Sabanci Univ Fac Engn & Nat Sci TR-34956 Istanbul Turkey
Homomorphic sorting is an operation that blindly sorts a given set of encrypted numbers without decrypting them (thus, there is no need for the secret key). In this article, we propose a new, efficient, and scalable m... 详细信息
来源: 评论
Work-In-Progress: private Runtime Verification
Work-In-Progress: Private Runtime Verification
收藏 引用
Embedded Systems Week / Int Conf on Compilers, Architecture, and Synthesis for Embedded Systems (CASES) / International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS) / Int Conf on Embedded Software (EMSOFT)
作者: Abbas, Houssam Oregon State Univ Corvallis OR 97331 USA
Complex systems require runtime monitoring of their operation, and this task can be performed by a separate monitoring process. A hacked monitor however could use the system traces it receives to attack the system or ... 详细信息
来源: 评论
Applications of Fully Homomorphic Encryption
Applications of Fully Homomorphic Encryption
收藏 引用
作者: Gizem S. Cetin Worcester Polytechnic Institute
学位级别:博士
Homomorphic encryption has progressed rapidly in both efficiency and versatility since its emergence in 2009. Meanwhile, a multitude of pressing privacy needs --- ranging from cloud computing to healthcare management ... 详细信息
来源: 评论
Ryoan: A Distributed Sandbox for Untrusted computation on Secret Data
收藏 引用
ACM TRANSACTIONS ON COMPUTER SYSTEMS 2018年 第4期35卷 13-13页
作者: Hunt, Tyler Zhu, Zhiting Xu, Yuanzhong Peter, Simon Witchel, Emmett Univ Texas Austin Comp Sci Dept 2317 SpeedwayStop D9500 Austin TX 78712 USA Google 1600 Amphitheatre Pkwy Mountain View CA 94043 USA
Users of modern data-processing services such as tax preparation or genomic screening are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret data while it is processed by service... 详细信息
来源: 评论