Sciweavers

232 search results - page 2 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
11 years 8 months ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
GRID
2004
Springer
13 years 11 months ago
Implementation and Evaluation of a ReplicaSet Grid Service
We present the implementation and performance of a ReplicaSet service based on the specification developed in the OGSA Data Replication Services (OREP) Working Group of the Global...
Mary Manohar, Ann L. Chervenak, Ben Clifford, Carl...
CHI
2007
ACM
14 years 5 months ago
Authorable virtual peers for children with autism
For my dissertation, I am designing, implementing and evaluating the use of a new kind of "authorable" virtual peer that allows children with autism to learn about recip...
Andrea Tartaro
IE
2007
13 years 7 months ago
Implementation and evaluation of a background music reactive game
This paper discusses further work on the authors’ “background music reactive games” concept, where background music is used to modify video game parameters and thus actions ...
Khalid Aallouche, Homam Albeiriss, Redouane Zargho...
FPL
2010
Springer
129views Hardware» more  FPL 2010»
13 years 3 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...