Sciweavers

157 search results - page 28 / 32
» Universally Composable Signcryption
Sort
View
BMCBI
2010
137views more  BMCBI 2010»
13 years 2 months ago
The ancient history of the structure of ribonuclease P and the early origins of Archaea
Background: Ribonuclease P is an ancient endonuclease that cleaves precursor tRNA and generally consists of a catalytic RNA subunit (RPR) and one or more proteins (RPPs). It repre...
Feng-Jie Sun, Gustavo Caetano-Anollés
TCC
2009
Springer
255views Cryptology» more  TCC 2009»
14 years 8 months ago
LEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao's garbled circuits. Unfortunately, Yao's construction provide security only again...
Jesper Buus Nielsen, Claudio Orlandi
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
14 years 2 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
TRIDENTCOM
2008
IEEE
14 years 2 months ago
The NTP experimental platform for heterogeneous wireless sensor networks
— This paper presents the NTP experimental platform for heterogeneous wireless sensor networks (WSN), which is built on the campus of National Tsing Hua University under the supp...
Sheng-Po Kuo, Chun-Yu Lin, Yueh-Feng Lee, Hua-Wei ...
JSSPP
2007
Springer
14 years 1 months ago
A Job Self-scheduling Policy for HPC Infrastructures
The number of distributed high performance computing architectures has increased exponentially these last years. Thus, systems composed by several computational resources provided ...
Francesc Guim, Julita Corbalán