Learn More
Private set operation (PSO) protocols provide a natural way of securely performing operations on data sets, such that crucial details of the input sets are not revealed. Such protocols have an ever-increasing number of practical applications, particularly when implementing privacy-preserving data mining schemes. Protocols for computing private set(More)
In this work we propose a model for conducting efficient and mutually beneficial information sharing between two competing entities, focusing specifically on software vulnerability sharing. We extend the two-stage game-theoretic model proposed by Khouzani et al. [18] for bug sharing, addressing two key features: we allow security information to be(More)
  • Tejaswini A. Kamble, TEJASWINI A. KAMBLE, +5 authors Alex Davidson
  • 2015
ii DEDICATION I dedicate this work to my beloved parents, Snehalata A. Kamble and A. S. Kamble. iii ACKNOWLEDGEMENTS I would like to express my special appreciation and thanks to my advisor Professor Dr. Marcis Jansons for giving me the opportunity to work in his Low Temperature Combustion Laboratory and also as Graduate Teaching Assistant for the course(More)
  • 1