Sciweavers

36 search results - page 7 / 8
» A Practical Voting Scheme with Receipts
Sort
View
IACR
2011
89views more  IACR 2011»
12 years 5 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
PKC
2011
Springer
185views Cryptology» more  PKC 2011»
12 years 8 months ago
Signatures on Randomizable Ciphertexts
xtended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC 2011 (6–9 march 2011, Taormina, Italy) D. Catalano, N. F...
Olivier Blazy, Georg Fuchsbauer, David Pointcheval...
ATAL
2009
Springer
14 years 10 days ago
On the complexity of schedule control problems for knockout tournaments
Knockout tournaments constitute a common format of sporting events, and also model a specific type of election scheme (namely, sequential pairwise elimination election). In such ...
Thuc Vu, Alon Altman, Yoav Shoham
ICIP
2007
IEEE
13 years 9 months ago
Computer-Aided Grading of Neuroblastic Differentiation: Multi-Resolution and Multi-Classifier Approach
In this paper, the development of a computer-aided system for the classification of grade of neuroblastic differentiation is presented. This automated process is carried out withi...
Jun Kong, Olcay Sertel, Hiroyuki Shimada, Kim L. B...
SIGMOD
2007
ACM
136views Database» more  SIGMOD 2007»
14 years 6 months ago
Progressive optimization in a shared-nothing parallel database
Commercial enterprise data warehouses are typically implemented on parallel databases due to the inherent scalability and performance limitation of a serial architecture. Queries ...
Wook-Shin Han, Jack Ng, Volker Markl, Holger Kache...