Sciweavers

53 search results - page 7 / 11
» Dualities in full homomorphisms
Sort
View
FC
2003
Springer
101views Cryptology» more  FC 2003»
14 years 20 days ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
PKC
2010
Springer
179views Cryptology» more  PKC 2010»
13 years 11 months ago
Preventing Pollution Attacks in Multi-source Network Coding
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipi...
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Man...
ICISC
2004
173views Cryptology» more  ICISC 2004»
13 years 8 months ago
On Private Scalar Product Computation for Privacy-Preserving Data Mining
In mining and integrating data from multiple sources, there are many privacy and security issues. In several different contexts, the security of the full privacy-preserving data mi...
Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mi...
ICC
2007
IEEE
147views Communications» more  ICC 2007»
14 years 1 months ago
QAM Codebooks for Low-Complexity Limited Feedback MIMO Beamforming
— This paper proposes a new QAM based codebook for beamforming in multiple-input multiple-output (MIMO) wireless systems with a limited-rate feedback channel. We show that such c...
Daniel J. Ryan, I. Vaughan, L. Clarkson, Iain B. C...
APAL
2007
99views more  APAL 2007»
13 years 7 months ago
A categorical semantics for polarized MALL
In this paper, we present a categorical model for Multiplicative Additive Polarized Linear Logic MALLP, which is the linear fragment (without structural rules) of Olivier Laurentâ...
Masahiro Hamano, Philip J. Scott