Sciweavers

173 search results - page 11 / 35
» Efficient One-Round Key Exchange in the Standard Model
Sort
View
ICICS
2010
Springer
14 years 7 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
ISCI
2010
146views more  ISCI 2010»
14 years 6 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
JCNS
2010
103views more  JCNS 2010»
14 years 4 months ago
Efficient computation of the maximum a posteriori path and parameter estimation in integrate-and-fire and more general state-spa
A number of important data analysis problems in neuroscience can be solved using state-space models. In this article, we describe fast methods for computing the exact maximum a pos...
Shinsuke Koyama, Liam Paninski
IJWMC
2010
103views more  IJWMC 2010»
14 years 6 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
ICISC
2008
103views Cryptology» more  ICISC 2008»
14 years 11 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003