Sciweavers

977 search results - page 106 / 196
» Secure Computation with Fixed-Point Numbers
Sort
View
CAV
2012
Springer
243views Hardware» more  CAV 2012»
11 years 11 months ago
SPT: Storyboard Programming Tool
elor Thesis: Demand Driven Abstraction Refinement Kendriya Vidyalaya ONGC, Dehradun, Uttaranchal INDIA All India Senior Secondary Examination, May 2004 • Secured 97.6 % marks in...
Rishabh Singh, Armando Solar-Lezama
MINENET
2006
ACM
14 years 3 months ago
Privacy-preserving performance measurements
Internet performance is an issue of great interest, but it is not trivial to measure. A number of commercial companies try to measure this, as does RIPE, and many individual Inter...
Matthew Roughan, Yin Zhang

Book
310views
15 years 5 months ago
Mastering Enterprise JavaBeans Third Edition
"Published in January 2005, the best-selling book Mastering EJB is now in its third edition and has been updated for EJB2.1 and also features new chapters on security and Web ...
Ed Roman, Rima Patel Sriganesh, and Gerald Brose
IJISEC
2002
58views more  IJISEC 2002»
13 years 8 months ago
A complete characterization of a family of key exchange protocols
Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a one-bit secret key which is informationtheoretically secure from t...
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
ASIACRYPT
2010
Springer
13 years 7 months ago
Short Pairing-Based Non-interactive Zero-Knowledge Arguments
We construct non-interactive zero-knowledge arguments for circuit satisfiability with perfect completeness, perfect zero-knowledge and computational soundness. The non-interactive ...
Jens Groth