Sciweavers

570 search results - page 6 / 114
» Black-box constructions for secure computation
Sort
View
GI
2009
Springer
14 years 14 days ago
Area Preserving Parameterisation of Shapes with Spherical Topology
: Statistical shape models are powerful tools for model-based segmentation and have been sucessfully applied to the segmentation of various structures in medical images. Though the...
Matthias Kirschner, Stefan Wesarg
CSFW
2012
IEEE
11 years 10 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
CCS
2005
ACM
14 years 1 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
HASE
2002
IEEE
14 years 24 days ago
The Concept and Practice of Software Quality Assurance in Japan in the Global Era
The Japanese computer industry in 1990s was hit with two major shocks at the same time. One shock was the drastic reform of computers and of network. The other shock was from the ...
Katsuyuki Yasuda, Shigeru Yamada
ICMLA
2009
13 years 5 months ago
Discovering Rules from Disk Events for Predicting Hard Drive Failures
Detecting impending failure of hard disks is an important prediction task which might help computer systems to prevent loss of data and performance degradation. Currently most of t...
Vipul Agarwal, Chiranjib Bhattacharyya, Thirumale ...