Sciweavers

8828 search results - page 1577 / 1766
» Formal methods in practice
Sort
View
IACR
2011
113views more  IACR 2011»
14 years 4 months ago
Fully Homomorphic SIMD Operations
At PKC 2010 Smart and Vercauteren presented a variant of Gentry’s fully homomorphic public key encryption scheme and mentioned that the scheme could support SIMD style operations...
Nigel P. Smart, Frederik Vercauteren
IACR
2011
134views more  IACR 2011»
14 years 4 months ago
An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis
A theme of recent side-channel research has been the quest for distinguishers which remain eective even when few assumptions can be made about the underlying distribution of the m...
Carolyn Whitnall, Elisabeth Oswald, Luke Mather
COMSNETS
2012
168views more  COMSNETS 2012»
14 years 5 days ago
Limitations of scanned human copresence encounters for modelling proximity-borne malware
—Patterns of human encounters, which are difficult to observe directly, are fundamental to the propagation of mobile malware aimed at infecting devices in spatial proximity. We ...
James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geof...
HICSS
2012
IEEE
285views Biometrics» more  HICSS 2012»
14 years 3 days ago
Identifying Informational Needs for Open Government: The Case of Egypt
The success of open government initiatives depends on understanding the informational needs of the concerned citizens and other stakeholders as prerequisite for open access to rel...
Ralf Klischewski
ICA
2012
Springer
14 years 16 hour ago
Distributional Convergence of Subspace Estimates in FastICA: A Bootstrap Study
Independent component analysis (ICA) is possibly the most widespread approach to solve the blind source separation (BSS) problem. Many different algorithms have been proposed, tog...
Jarkko Ylipaavalniemi, Nima Reyhani, Ricardo Vig&a...
« Prev « First page 1577 / 1766 Last » Next »