When you think about how far and fast computer science has progressed in recent years, it's not hard to conclude that a seven-year old handbook may fall a little short of the kind of …
Advances in optoelectronic technologies have catapulted optical interconnects and optical computing to the forefront, opening possibilities not previously considered in conventional …
Decentralization in Environmental Governance is a critical reflection on the dangers and risks of governance renewal; warning against one-sided criticism on traditional command …
Abstract General two-party Secure Function Evaluation (SFE) allows mutually distrusting parties to correctly compute any function on their private input data, without revealing the …
T Gonzalez, J Diaz-Herrera, A Tucker - 2014 - books.google.com
Computing Handbook, Third Edition: Computer Science and Software Engineering mirrors the modern taxonomy of computer science and software engineering as described by the …
Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their …
T Schneider - Informatiktage, 2008 - download.hrz.tu-darmstadt.de
This thesis focuses on practical aspects of general two-party Secure Function Evaluation (SFE). We give a new SFE protocol that allows free evaluation of XOR gates and is provably …
Abstract General two-party Secure Function Evaluation (SFE) allows mutually distrusting parties to (jointly) correctly compute\emph {any} function on their private input data, without …
This is a survey of results about versions of fine hierarchies and many-one reducibilities that appear in different parts of theoretical computer science. These notions and related …