Abstract. Object-oriented design principles map well onto protocol implementations because protocols essentially manipulate two structures--packets and the states of the endpoints....
W. Timothy Strayer, Simon Gray, Raymond E. Cline J...
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
In this paper we model relational random variables on the edges of a network using Gaussian processes (GPs). We describe appropriate GP priors, i.e., covariance functions, for dir...
This paper presents a plug-in for Mozilla web browser that fetches personal information from a mobile device. Its purpose is to facilitate the repetitive entry of personal informa...
Volumetric data commonly has high depth complexity which makes it difficult to judge spatial relationships accurately. There are many different ways to enhance depth perception, su...