Macquarie University Home Page Macquarie University ResearchOnline

Showing items 1 - 6 of 6.

Add to Quick Collection   All 6 Results

  • First
  • Previous
  • 1
  • Next
  • Last
Sort:
 Add All Items to Quick Collection
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/118051
Description: 18 page(s)
Reviewed:Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/117602
Description: We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately... More
Reviewed:Reviewed
Date: 2008
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117111
Description: Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the dist... More
Reviewed:Reviewed
Date: 2008
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117133
Description: We present efficient protocols for private set disjointness tests. We start from an intuition of our protocols that applies Sylvester matrices. Unfortunately, this simple construction is insecure as i... More
Reviewed:Reviewed
Date: 2008
Subject Keyword: 080300 Computer Software
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117142
Description: Suppose two parties, holding vectors A = (a1,a2,...,an ) and B = (b1,b2,...,bn) respectively, wish to know whether ai > bi for all i, without disclosing any private input. This problem is called the v... More
Reviewed:Reviewed
Date: 2005
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/20000
Description: In current technologies, mobile computer data synchronisation protocols are typically programmed at a low-level. The disadvantages of this are that they are error-prone and time consuming. This paper ... More
Full Text: Full Text
Reviewed:Reviewed
  • First
  • Previous
  • 1
  • Next
  • Last