Sciweavers

229 search results - page 20 / 46
» Agreements Without Disagreements
Sort
View
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
12 years 3 days ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
JDCTA
2010
143views more  JDCTA 2010»
13 years 4 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
WWW
2003
ACM
14 years 10 months ago
The chatty web: emergent semantics through gossiping
This paper describes a novel approach for obtaining semantic interoperability among data sources in a bottom-up, semiautomatic manner without relying on pre-existing, global seman...
Karl Aberer, Manfred Hauswirth, Philippe Cudr&eacu...
STOC
2010
ACM
193views Algorithms» more  STOC 2010»
14 years 1 months ago
Privacy Amplification with Asymptotically Optimal Entropy Loss
We study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. (Such a setting is ubiquitous on th...
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostr...
COGSCI
2010
125views more  COGSCI 2010»
13 years 9 months ago
A Probabilistic Computational Model of Cross-Situational Word Learning
Words are the essence of communication: they are the building blocks of any language. Learning the meaning of words is thus one of the most important aspects of language acquisiti...
Afsaneh Fazly, Afra Alishahi, Suzanne Stevenson