Sciweavers

20175 search results - page 105 / 4035
» Is abstraction the key to computing
Sort
View
102
Voted
CSUR
2011
14 years 7 months ago
The failure detector abstraction
Felix C. Freiling, Rachid Guerraoui, Petr Kuznetso...
CONCUR
2012
Springer
13 years 3 months ago
A Theory of History Dependent Abstractions for Learning Interface Automata
Fides Aarts, Faranak Heidarian, Frits W. Vaandrage...
108
Voted
CSR
2008
Springer
15 years 2 months ago
Public Key Encryption and Encryption Emulation Attacks
The main purpose of this paper is to show that public key encryption can be secure against the "encryption emulation" attack (on the sender's encryption) by computat...
Denis Osin, Vladimir Shpilrain
IACR
2011
196views more  IACR 2011»
14 years 10 days ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
59
Voted
IWCMC
2006
ACM
15 years 6 months ago
Low-power group key agreement for heterogeneous wireless networks
Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng