Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Oblivious transfer
biblio
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking
Submitted by aekwall on Mon, 09/28/2020 - 12:01pm
Homomorphic encryption
Computing Theory and Privacy
statistical measures
secure multi-party computation
product cost optimisation
privacy-preserving benchmarking systems
Oblivious transfer
key performance indicators
key figure comparison
cloud-based privacy-preserving benchmarking
cloud-based KPI comparison
cloud-based
benchmarking system
Benchmarking
software performance evaluation
Cloud Computing
Privacy-preserving
Benchmark testing
Complexity theory
statistical analysis
Companies
privacy
pubcrawl
Human behavior
Resiliency
Protocols
data privacy
encryption
Cryptography
Scalability
biblio
An Efficient Oblivious Transfer Protocol with Access Control
Submitted by grigby1 on Thu, 01/31/2019 - 12:22pm
illegal user access
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
privacy-preserving database
privacy
OTAC
Oblivious transfer
Access Control
Elliptic curve cryptography
efficient oblivious transfer protocol
data privacy
Cryptographic Protocols
authorisation
Asia
anonymous messaging
anonymous access
access control policy
biblio
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer
Submitted by grigby1 on Mon, 05/22/2017 - 1:52pm
collaboration
composability
Human behavior
information theoretic security
Metrics
multi-party computation
Oblivious transfer
pubcrawl
Resiliency
Scalability
biblio
Toward Wireless Security without Computational Assumptions #x2014;Oblivious Transfer Based on Wireless Channel Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
polynomial-time computable function
wireless security
wireless devices
Wireless communication
wireless channels
wireless channel characteristics
transport protocols
security
Protocols
Probes
private communications
privacy preserving password verification
1-out-of-2 oblivious transfer protocol
physical channel characteristics
Oblivious transfer
data privacy
Cryptography
cryptographic tools
Cryptographic Protocols
cryptographic protocol
computational complexity
computational assumptions
Communication system security
Channel estimation