Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Many popular image compression schemes are based on block-transform coding, a technique where images are broken into small blocks of pixels prior to transformation and compression...
With the fast increase in Web activities, Web data mining has recently become an important research topic. However, most previous studies of mining path traversal patterns are bas...
An adaptive Exponential Integrate-and-Fire (aEIF) model was used to predict the activity of layer-V-pyramidal neurons of rat neocortex under random current injection. A new protoc...
Claudia Clopath, Renaud Jolivet, Alexander Rauch, ...