1 resultado para Private security sector
em DRUM (Digital Repository at the University of Maryland)
Filtro por publicador
- JISC Information Environment Repository (1)
- Aberdeen University (1)
- Academic Archive On-line (Jönköping University; Sweden) (1)
- Academic Research Repository at Institute of Developing Economies (5)
- Adam Mickiewicz University Repository (1)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (11)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (1)
- ArchiMeD - Elektronische Publikationen der Universität Mainz - Alemanha (1)
- Archive of European Integration (19)
- Aston University Research Archive (31)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (1)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (14)
- Bioline International (1)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (3)
- Brock University, Canada (1)
- CentAUR: Central Archive University of Reading - UK (21)
- Central European University - Research Support Scheme (2)
- CiencIPCA - Instituto Politécnico do Cávado e do Ave, Portugal (22)
- Cochin University of Science & Technology (CUSAT), India (5)
- Coffee Science - Universidade Federal de Lavras (2)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (55)
- Consorci de Serveis Universitaris de Catalunya (CSUC), Spain (24)
- CORA - Cork Open Research Archive - University College Cork - Ireland (1)
- Corvinus Research Archive - The institutional repository for the Corvinus University of Budapest (3)
- Digital Commons - Michigan Tech (1)
- Digital Commons at Florida International University (7)
- DigitalCommons@The Texas Medical Center (3)
- DigitalCommons@University of Nebraska - Lincoln (1)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (23)
- DRUM (Digital Repository at the University of Maryland) (1)
- Duke University (3)
- Galway Mayo Institute of Technology, Ireland (1)
- Glasgow Theses Service (1)
- Helvia: Repositorio Institucional de la Universidad de Córdoba (1)
- Institute of Public Health in Ireland, Ireland (1)
- Instituto Politécnico de Viseu (1)
- Instituto Politécnico do Porto, Portugal (75)
- Iowa Publications Online (IPO) - State Library, State of Iowa (Iowa), United States (4)
- Memoria Académica - FaHCE, UNLP - Argentina (14)
- National Center for Biotechnology Information - NCBI (2)
- Nottingham eTheses (1)
- Portal de Revistas Científicas Complutenses - Espanha (3)
- Portal do Conhecimento - Ministerio do Ensino Superior Ciencia e Inovacao, Cape Verde (1)
- QSpace: Queen's University - Canada (3)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (2)
- RCAAP - Repositório Científico de Acesso Aberto de Portugal (2)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (2)
- Repositório Aberto da Universidade Aberta de Portugal (3)
- REPOSITÓRIO ABERTO do Instituto Superior Miguel Torga - Portugal (1)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (61)
- Repositório da Escola Nacional de Administração Pública (ENAP) (20)
- Repositório da Produção Científica e Intelectual da Unicamp (5)
- Repositório da Universidade Federal do Espírito Santo (UFES), Brazil (5)
- Repositório de Administração Pública (REPAP) - Direção-Geral da Qualificação dos Trabalhadores em Funções Públicas (INA), Portugal (8)
- Repositório digital da Fundação Getúlio Vargas - FGV (22)
- Repositório do Centro Hospitalar de Lisboa Central, EPE - Centro Hospitalar de Lisboa Central, EPE, Portugal (2)
- Repositório Institucional da Universidade Federal do Rio Grande do Norte (1)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (14)
- Repositorio Institucional Universidad de Medellín (1)
- Repositorio Institucional Universidad EAFIT - Medelin - Colombia (1)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (81)
- Scielo Saúde Pública - SP (33)
- Scottish Institute for Research in Economics (SIRE) (SIRE), United Kingdom (2)
- SerWisS - Server für Wissenschaftliche Schriften der Fachhochschule Hannover (1)
- Universidad de Alicante (3)
- Universidad del Rosario, Colombia (47)
- Universidad Politécnica de Madrid (9)
- Universidade do Minho (2)
- Universidade dos Açores - Portugal (6)
- Universidade Federal do Rio Grande do Norte (UFRN) (5)
- Universidade Metodista de São Paulo (2)
- Universidade Técnica de Lisboa (1)
- Universitat de Girona, Spain (1)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (4)
- Université de Lausanne, Switzerland (15)
- Université de Montréal (2)
- Université de Montréal, Canada (15)
- University of Canberra Research Repository - Australia (1)
- University of Connecticut - USA (2)
- University of Michigan (53)
- University of Queensland eSpace - Australia (105)
- University of Washington (2)
- Worcester Research and Publications - Worcester Research and Publications - UK (1)
Resumo:
Secure computation involves multiple parties computing a common function while keeping their inputs private, and is a growing field of cryptography due to its potential for maintaining privacy guarantees in real-world applications. However, current secure computation protocols are not yet efficient enough to be used in practice. We argue that this is due to much of the research effort being focused on generality rather than specificity. Namely, current research tends to focus on constructing and improving protocols for the strongest notions of security or for an arbitrary number of parties. However, in real-world deployments, these security notions are often too strong, or the number of parties running a protocol would be smaller. In this thesis we make several steps towards bridging the efficiency gap of secure computation by focusing on constructing efficient protocols for specific real-world settings and security models. In particular, we make the following four contributions: - We show an efficient (when amortized over multiple runs) maliciously secure two-party secure computation (2PC) protocol in the multiple-execution setting, where the same function is computed multiple times by the same pair of parties. - We improve the efficiency of 2PC protocols in the publicly verifiable covert security model, where a party can cheat with some probability but if it gets caught then the honest party obtains a certificate proving that the given party cheated. - We show how to optimize existing 2PC protocols when the function to be computed includes predicate checks on its inputs. - We demonstrate an efficient maliciously secure protocol in the three-party setting.