Sciweavers

347 search results - page 35 / 70
» On private computation in incomplete networks
Sort
View
BIBE
2009
IEEE
185views Bioinformatics» more  BIBE 2009»
14 years 25 days ago
Anomaly-free Prediction of Gene Ontology Annotations Using Bayesian Networks
Gene and protein structural and functional annotations expressed through controlled terminologies and ontologies are paramount especially for the aim of inferring new biomedical k...
Marco Tagliasacchi, Marco Masseroli
ESORICS
2008
Springer
13 years 9 months ago
A Distributed Implementation of the Certified Information Access Service
In this paper we consider the problem of securely outsourcing computation on private data. We present a protocol for securely distributing the computation of the data structures u...
Carlo Blundo, Emiliano De Cristofaro, Aniello Del ...
WCNC
2008
IEEE
14 years 2 months ago
Anonymous ID-Based Group Key Agreement for Wireless Networks
—Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID...
Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
13 years 11 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri

Publication
1298views
15 years 6 months ago
Quality of Service for Internet Traffic over ATM Service Categories
Connecting enterprise sites requires innovative architectures. Virtual private networks (VPNs) linking different organizational sites over the Internet are a popular solution. Inte...
Sonia Fahmy, Raj Jain, Sameh Rabie, Rohit Goyal, B...