Sciweavers

24188 search results - page 229 / 4838
» Computing on Encrypted Data
Sort
View
131
Voted
ICPPW
2003
IEEE
15 years 8 months ago
From Distributed Sequential Computing to Distributed Parallel Computing
One approach to distributed parallel programming is to utilize self-migrating threads. Computations can be distributed first, and parallelized second. The first step produces a ...
Lei Pan, Lubomir Bic, Michael B. Dillencourt, Ming...
194
Voted
CCA
2009
Springer
15 years 8 months ago
From Interval Computations to Constraint-Related Set Computations: Towards Faster Estimation of Statistics and ODEs under Interv
Interval computations estimate the uncertainty of the result of data processing in situations in which we only know the upper bounds ∆ on the measurement errors. In this case, ba...
Vladik Kreinovich
129
Voted
EUROCRYPT
2009
Springer
16 years 4 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
TCC
2009
Springer
167views Cryptology» more  TCC 2009»
16 years 4 months ago
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side-channel attack against cryptosystems, termed the &qu...
Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan
157
Voted
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
16 years 4 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao