Sciweavers

2642 search results - page 48 / 529
» The development of Chez Scheme
Sort
View
EUROCRYPT
2012
Springer
12 years 8 days ago
Property Preserving Symmetric Encryption
Abstract. Processing on encrypted data is a subject of rich investigation. Several new and exotic encryption schemes, supporting a diverse set of features, have been developed for ...
Omkant Pandey, Yannis Rouselakis
ASIACRYPT
2001
Springer
14 years 2 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
SEAFOOD
2007
Springer
14 years 4 months ago
Questionnaire-Based Risk Assessment Scheme for Japanese Offshore Software Outsourcing
Abstract. As the volumes of software development increase and the cost reduction is required, most Japanese IT companies are interested in offshore software outsourcing. Although a...
Hiroshi Tsuji, Akito Sakurai, Kenichi Yoshida, Amr...
ICC
2007
IEEE
130views Communications» more  ICC 2007»
14 years 4 months ago
A Dynamic QoS-Based Scheme for Admission Control in OBS Networks
—Optical burst switching (OBS) technology is a promising solution for the next generation Internet backbone. However, call admission control (CAC) and QoS support constitute crit...
Amor Lazzez, Sihem Guemara-ElFatmi, Noureddine Bou...
CEC
2005
IEEE
14 years 3 months ago
The fitness map scheme: application to interactive multifractal image denoising
AbstractInteractive evolutionary algorithms (IEA) often suffer from what is called the “user bottleneck.” In this paper, we propose and analyse a method to limit the user inter...
Evelyne Lutton, Mario Pilz, Jacques Lévy V&...