Sciweavers

262 search results - page 19 / 53
» Secure Hamming Distance Based Computation and Its Applicatio...
Sort
View
CCS
2007
ACM
14 years 22 hour ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
WS
2004
ACM
14 years 1 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
ICICS
2009
Springer
14 years 2 months ago
GUC-Secure Join Operator in Distributed Relational Database
Privacy-preserving SQL computation in distributed relational database is one of important applications of secure multiparty computation. In contrast with comparatively more works o...
Yuan Tian, Hao Zhang
BMCBI
2008
139views more  BMCBI 2008»
13 years 8 months ago
A topological transformation in evolutionary tree search methods based on maximum likelihood combining p-ECR and neighbor joinin
Background: Inference of evolutionary trees using the maximum likelihood principle is NP-hard. Therefore, all practical methods rely on heuristics. The topological transformations...
Maozu Guo, Jian-Fu Li, Yang Liu
IADIS
2004
13 years 9 months ago
Problem-Based Learning Method Simulation by PBL Virtual Environment
Problem Based Learning (PBL) is a new teaching-learning method originated from the changes that have occurred in the world economical basis and in the information and communicatio...
Hernane Borges de Barros Pereira, Gabriela Ribeiro...