Sciweavers

382 search results - page 71 / 77
» A Virtual Presence Counter
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 4 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
JIPS
2007
223views more  JIPS 2007»
15 years 4 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
IACR
2011
104views more  IACR 2011»
14 years 3 months ago
Collusion Resistant Obfuscation and Functional Re-encryption
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
Nishanth Chandran, Melissa Chase, Vinod Vaikuntana...
W2GIS
2009
Springer
15 years 10 months ago
Database and Representation Issues in Geographic Information Systems (GIS)
Abstract. A review is provided of some database and representation issues involved in the implementation of geographic information systems (GIS). The increasing popularity of web-b...
Hanan Samet
BMCBI
2006
90views more  BMCBI 2006»
15 years 4 months ago
A Fourier Transformation based Method to Mine Peptide Space for Antimicrobial Activity
Background: Naturally occurring antimicrobial peptides are currently being explored as potential candidate peptide drugs. Since antimicrobial peptides are part of the innate immun...
Vijayaraj Nagarajan, Navodit Kaushik, Beddhu Mural...