Design, Analysis, and Evaluation of Mobile Agent based Privacy Protection Scheme for Multi-party Computation Problems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mobile Agent based Computing Model for Enhancing Privacy in Multi-party Collaborative Problem solving

Privacy is an important issue in multi-party collaborative problems that are conventionally dealt with distributed algorithms. To get the solution, the participants need to share their private information, resulting in privacy loss. Several multiagent algorithms try to reduce privacy loss by reducing the amount of shared private information among the agents. To address the privacy issue in mult...

متن کامل

MARP: Mobile Agent for RFID Privacy Protection

Recently many researchers in various fields has noticed RFID system. RFID system has many advantages more than other automatic identification system. However, it has some consumer privacy problems, such as location tracking and disclosure of personal information. Most of related works have focused on the cryptographic scheme for the RFID tag and the reader. In this paper, a proxy agent scheme u...

متن کامل

Trading Correctness for Privacy in Unconditional Multi-Party Computation

This paper improves on the classical results in unconditionally secure multi-party computation among a set of n players, by considering a model with three simultaneously occurring types of player corruption: the adversary can actively corrupt (i.e. take full control over) up to ta players and, additionally, can passively corrupt (i.e. read the entire information of) up to tp players and fail-co...

متن کامل

Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation

In symmetric secure function evaluation (SSFE), Alice has an input x, Bob has an inputy, and both parties wish to securely compute f(x, y). We show several new results classifyingthe feasibility of securely implementing these functions in several security settings. Namely, wegive new alternate characterizations of the functions that have (statistically) secure protocolsagainst p...

متن کامل

Privacy-Preserving Classification and Clustering Using Secure Multi-Party Computation

Nowadays, data mining and machine learning techniques are widely used in electronic applications in different areas such as e-government, e-health, e-business, and so on. One major and very crucial issue in these type of systems, which are normally distributed among two or more parties and are dealing with sensitive data, is preserving the privacy of individual’s sensitive information. Each par...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IPSJ Digital Courier

سال: 2007

ISSN: 1349-7456

DOI: 10.2197/ipsjdc.3.320