Sciweavers

19003 search results - page 212 / 3801
» We Need Assurance!
Sort
View
CCS
2008
ACM
14 years 23 days ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
EFDBS
2003
14 years 4 days ago
Four-Level-Architecture for Closure in Interoperability
A definition of types in an information system is given from ld abstractions through data constructs, schema and definitions to physical data values. Category theory suggests tha...
B. Nick Rossiter, Michael A. Heather
ICISC
2000
126views Cryptology» more  ICISC 2000»
14 years 3 days ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 11 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
BMCBI
2006
106views more  BMCBI 2006»
13 years 10 months ago
Methodological study of affine transformations of gene expression data with proposed robust non-parametric multi-dimensional nor
Background: Low-level processing and normalization of microarray data are most important steps in microarray analysis, which have profound impact on downstream analysis. Multiple ...
Henrik Bengtsson, Ola Hössjer