Sciweavers

28 search results - page 5 / 6
» uc 2009
Sort
View
SIGCSE
2009
ACM
82views Education» more  SIGCSE 2009»
14 years 7 months ago
An experience report on the design and delivery of two new software design courses
In this paper, we report on our experience in designing and delivering two new software design courses in the Informatics major at UC Irvine. When the major was created in 2004, i...
Alex Baker, André van der Hoek
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 7 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
WWW
2009
ACM
14 years 7 months ago
Efficient interactive fuzzy keyword search
Traditional information systems return answers after a user submits a complete query. Users often feel "left in the dark" when they have limited knowledge about the unde...
Shengyue Ji, Guoliang Li, Chen Li, Jianhua Feng
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
14 years 1 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
ASIACRYPT
2009
Springer
14 years 1 months ago
Secure Multi-party Computation Minimizing Online Rounds
Multi-party secure computations are general important procedures to compute any function while keeping the security of private inputs. In this work we ask whether preprocessing can...
Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yun...