Sciweavers

1005 search results - page 58 / 201
» Practical Secure Function Evaluation
Sort
View
ICC
2007
IEEE
170views Communications» more  ICC 2007»
14 years 3 months ago
Evaluating Techniques for Network Layer Independence in Cognitive Networks
— Cognitive networks are the latest progression of cognitive functionality into the networking stack, an effort which began with a layer one and two focus on cognitive radios, an...
Muthukumaran Pitchaimani, Benjamin J. Ewy, Joseph ...
TSE
2008
103views more  TSE 2008»
13 years 8 months ago
A Realistic Empirical Evaluation of the Costs and Benefits of UML in Software Maintenance
The Unified Modeling Language (UML) is the de facto standard for object-oriented software analysis and design modeling. However, few empirical studies exist which investigate the c...
Wojciech J. Dzidek, Erik Arisholm, Lionel C. Brian...
EUROPAR
2007
Springer
13 years 10 months ago
Evaluation of a Utility Computing Model Based on the Federation of Grid Infrastructures
Utility computing is a service provisioning model which will provide adaptive, flexible and simple access to computing resources, enabling a pay-per-use model for computing simila...
Constantino Vázquez, Eduardo Huedo, Rub&eac...
IJCSA
2006
121views more  IJCSA 2006»
13 years 8 months ago
Evaluation of the RC4 Algorithm for Data Encryption
Analysis of the effect of different parameters of the RC4 encryption algorithm where examined. Some experimental work was performed to illustrate the performance of this algorithm...
Allam Mousa, Ahmad Hamad
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
14 years 25 days ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz