Sciweavers

92 search results - page 7 / 19
» Efficient Secret Sharing with Access Structures in a Hierarc...
Sort
View
IPL
2006
86views more  IPL 2006»
13 years 7 months ago
Monotone circuits for monotone weighted threshold functions
Weighted threshold functions with positive weights are a natural generalization of unweighted threshold functions. These functions are clearly monotone. However, the naive way of ...
Amos Beimel, Enav Weinreb
BCSHCI
2007
13 years 9 months ago
Using hierarchies to support non-visual access to relational diagrams
This paper describes an approach to support non-visual exploration of graphically represented information. We used a hierarchical structure to organize the information encoded in ...
Oussama Metatla, Nick Bryan-Kinns, Tony Stockman
IACR
2011
88views more  IACR 2011»
12 years 7 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 7 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
ICDE
2003
IEEE
180views Database» more  ICDE 2003»
14 years 8 months ago
Medical Video Mining for Efficient Database Indexing, Management and Access
1 To achieve more efficient video indexing and access, we introduce a video database management framework and strategies for video content structure and events mining. The video sh...
Xingquan Zhu, Walid G. Aref, Jianping Fan, Ann Chr...