Sciweavers

15 search results - page 3 / 3
» deds 2010
Sort
View
CRYPTO
2010
Springer
195views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
This paper presents a fully secure functional encryption scheme for a wide class of relations, that are specified by non-monotone access structures combined with inner-product rel...
Tatsuaki Okamoto, Katsuyuki Takashima
BMCBI
2010
94views more  BMCBI 2010»
13 years 5 months ago
Comparison study of microarray meta-analysis methods
Background: Meta-analysis methods exist for combining multiple microarray datasets. However, there are a wide range of issues associated with microarray meta-analysis and a limite...
Anna Campain, Yee Hwa Yang
PKC
2010
Springer
161views Cryptology» more  PKC 2010»
13 years 6 months ago
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
ded abstract of this paper appears in 13th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2010, Lecture Notes in Computer Science Vol. ?, P. Nguye...
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Vi...
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 3 months ago
Multitriangulations, pseudotriangulations and primitive sorting networks
We study the set of all pseudoline arrangements with contact points which cover a given support. We define a notion of flip which transforms a pseudoline arrangement with contact...
Vincent Pilaud, Michel Pocchiola
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti