Sciweavers

5722 search results - page 89 / 1145
» Security Function Interactions
Sort
View
EUROCRYPT
2006
Springer
14 years 14 days ago
Compact Group Signatures Without Random Oracles
We present the first efficient group signature scheme that is provably secure without random oracles. We achieve this result by combining provably secure hierarchical signatures i...
Xavier Boyen, Brent Waters
STOC
2012
ACM
236views Algorithms» more  STOC 2012»
11 years 11 months ago
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
We propose a new notion of secure multiparty computation aided by a computationally-powerful but untrusted “cloud” server. In this notion that we call on-the-fly multiparty c...
Adriana López-Alt, Eran Tromer, Vinod Vaiku...
RIAO
2007
13 years 10 months ago
Exploring Interactive Information Retrieval: An Integrated Approach to Interface Design and Interaction Analysis
In this paper, we describe a novel methodology that integrates the design of the (i) user interface; (ii) interaction logger; and (iii) log analyzer. It is based on formalizing, v...
Gheorghe Muresan
BICOB
2009
Springer
14 years 24 days ago
Constrained Fisher Scores Derived from Interaction Profile Hidden Markov Models Improve Protein to Protein Interaction Predictio
Protein-protein interaction plays critical roles in cellular functions. In this work, we propose a computational method to predict protein-protein interaction by using support vec...
Alvaro J. González, Li Liao
COMPSAC
2008
IEEE
14 years 3 months ago
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming
The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive industry. Such systems need to be open and extensible to provide customised function...
Phu H. Phung, David Sands