Sciweavers

135 search results - page 8 / 27
» Secure Computation of the Mean and Related Statistics
Sort
View
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
14 years 9 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim
CODASPY
2012
12 years 4 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
PCI
2005
Springer
14 years 2 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 8 months ago
The semantic mapping of words and co-words in contexts
Meaning can be generated when information is related at a systemic level. Such a system can be an observer, but also a discourse, for example, operationalized as a set of document...
Loet Leydesdorff, Kasper Welbers
BMCBI
2008
154views more  BMCBI 2008»
13 years 8 months ago
Sequence based residue depth prediction using evolutionary information and predicted secondary structure
Background: Residue depth allows determining how deeply a given residue is buried, in contrast to the solvent accessibility that differentiates between buried and solvent-exposed ...
Hua Zhang, Tuo Zhang, Ke Chen 0003, Shiyi Shen, Ji...