Sciweavers

86 search results - page 9 / 18
» Impossibility Results for Secret Establishment
Sort
View
CIVR
2007
Springer
115views Image Analysis» more  CIVR 2007»
14 years 1 months ago
A reranking approach for context-based concept fusion in video indexing and retrieval
We propose to incorporate hundreds of pre-trained concept detectors to provide contextual information for improving the performance of multimodal video search. The approach takes ...
Lyndon S. Kennedy, Shih-Fu Chang
TCC
2007
Springer
91views Cryptology» more  TCC 2007»
14 years 1 months ago
Lower Bounds for Non-interactive Zero-Knowledge
Abstract. We establish new lower bounds and impossibility results for noninteractive zero-knowledge proofs and arguments with set-up assumptions. – For the common random string m...
Hoeteck Wee
BMCBI
2010
86views more  BMCBI 2010»
13 years 8 months ago
An automatic method for identifying surface proteins in bacteria: SLEP
Background: Bacterial infections represent a global health challenge. The identification of novel antibacterial targets for both therapy and vaccination is needed on a constant ba...
Emanuela Giombini, Massimiliano Orsini, Danilo Car...
EUROCRYPT
2008
Springer
13 years 9 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 8 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi