Sciweavers

1005 search results - page 89 / 201
» Practical Secure Function Evaluation
Sort
View
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
14 years 26 days ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
BMCBI
2006
72views more  BMCBI 2006»
13 years 9 months ago
Selecting effective siRNA sequences by using radial basis function network and decision tree learning
Background: Although short interfering RNA (siRNA) has been widely used for studying gene functions in mammalian cells, its gene silencing efficacy varies markedly and there are o...
Shigeru Takasaki, Yoshihiro Kawamura, Akihiko Kona...
ACG
2003
Springer
14 years 2 months ago
Search versus Knowledge: An Empirical Study of Minimax on KRK
This article presents the results of an empirical experiment designed to gain insight into what is the effect of the minimax algorithm on the evaluation function. The experiment’...
Aleksander Sadikov, Ivan Bratko, Igor Kononenko
ISSA
2008
13 years 10 months ago
Towards a Framework for a Network Warfare Capability
Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of v...
Namosha Veerasamy, Jan H. P. Eloff