Sciweavers

2542 search results - page 162 / 509
» One step ahead
Sort
View
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
14 years 4 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
LATA
2010
Springer
14 years 4 months ago
Choosing Word Occurrences for the Smallest Grammar Problem
The smallest grammar problem - namely, finding a smallest context-free grammar that generates exactly one sequence - is of practical and theoretical importance in fields such as ...
Rafael Carrascosa, François Coste, Matthias...
STOC
2009
ACM
238views Algorithms» more  STOC 2009»
14 years 4 months ago
Fully homomorphic encryption using ideal lattices
We propose a fully homomorphic encryption scheme – i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in t...
Craig Gentry
ICASSP
2009
IEEE
14 years 4 months ago
Wrapping snakes for improved lip segmentation
A key step in the process of lip-reading is determining the shape of the speaker’s lips. This has previously been achieved through an energy method known as “snakes”, howeve...
Matthew Ramage, Euan Lindsay
ICSM
2009
IEEE
14 years 4 months ago
Inquiring the usage of aspect-oriented programming: An empirical study
Back in 2001, the MIT announced aspect-oriented programming as a key technology in the next 10 years. Nowadays, 8 years later, AOP is not widely adopted. Several reasons can expla...
Freddy Munoz, Benoit Baudry, Romain Delamare, Yves...