Sciweavers

154 search results - page 2 / 31
» Computing universal models under guarded TGDs
Sort
View
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz
RTAS
2005
IEEE
13 years 11 months ago
A Real-Time Performance Comparison of Distributable Threads and Event Channels
No one middleware communication model completely solves the problem of ensuring schedulability in every DRE system. Furthermore, there have been few studies to date of the trade-o...
Yuanfang Zhang, Bryan Thrall, Stephen Torri, Chris...
CVPR
2009
IEEE
15 years 17 days ago
Enhanced Pictorial Structures for Precise Eye Localization under Uncontrolled Conditions
In this paper, we present an enhanced Pictorial Struc- ture (PS) model for precise eye localization, a fundamen- tal problem involved in many face processing tasks. PS is a comp...
Xiaoyang Tan (Nanjing University of Aeronautics an...
FOCS
2003
IEEE
13 years 10 months ago
General Composition and Universal Composability in Secure Multi-Party Computation
Concurrent general composition relates to a setting where a secure protocol is run in a network concurrently with other, arbitrary protocols. Clearly, security in such a setting i...
Yehuda Lindell
STOC
2002
ACM
152views Algorithms» more  STOC 2002»
14 years 5 months ago
Universally composable two-party and multi-party secure computation
d Abstract) Ran Canetti Yehuda Lindell Rafail Ostrovsky Amit Sahai? We show how to securely realize any multi-party functionality in a universally composable way, regardless of th...
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Ami...