Sciweavers

62 search results - page 8 / 13
» A Dolev-Yao Model for Zero Knowledge
Sort
View
EMNLP
2010
13 years 5 months ago
A Tree Kernel-Based Unified Framework for Chinese Zero Anaphora Resolution
This paper proposes a unified framework for zero anaphora resolution, which can be divided into three sub-tasks: zero anaphor detection, anaphoricity determination and antecedent ...
Fang Kong, Guodong Zhou
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 7 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
TCC
2012
Springer
245views Cryptology» more  TCC 2012»
12 years 3 months ago
Secure Two-Party Computation with Low Communication
We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the ...
Ivan Damgård, Sebastian Faust, Carmit Hazay
ICIP
2007
IEEE
14 years 1 months ago
Radial Basis Functions Collocation Methods for Model Based Level-Set Segmentation
We consider a recent parametric level-set segmentation approach where the implicit interface is the zero level of a continuous function expanded onto compactly supported radial ba...
Amaud Gelas, Joël Schaerer, Olivier Bernard, ...
MOBIMEDIA
2007
13 years 9 months ago
Implementation aspects of a delegation system
In this paper we simulate an authorization and delegation system using knowledge based technology. This proposal is part of a visual tool that is intended to be an implementation ...
Isaac Agudo, Javier Lopez, José A. Monteneg...