Sciweavers

20175 search results - page 138 / 4035
» Is abstraction the key to computing
Sort
View
114
Voted
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
14 years 18 days ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
97
Voted
SSS
2010
Springer
154views Control Systems» more  SSS 2010»
14 years 11 months ago
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all exi...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar...
111
Voted
DGO
2009
111views Education» more  DGO 2009»
15 years 1 months ago
"Integrated" and "transcendent" e-government: keys for analyzing organizational structure and governance
As e-government enters the "transformation" phase, public authorities face major challenges in terms of governance and leadership. The present article consolidates prior...
Beat Estermann, Reinhard Riedl, Alessia C. Neuroni
135
Voted
ACS
2002
15 years 20 days ago
Categorical Abstract Algebraic Logic: Algebraizable Institutions
cal Abstract Algebraic Logic: Algebraizable Institutions To Don Pigozzi this work is dedicated GEORGE VOUTSADAKIS Department of Mathematics, Iowa State University, Ames, IA 50011 U...
George Voutsadakis
104
Voted
IPL
2010
94views more  IPL 2010»
14 years 11 months ago
Partial model checking via abstract interpretation
model checking via abstract interpretation N. De Francesco, G. Lettieri∗ , L. Martini, G. Vaglini Universit`a di Pisa, Dipartimento di Ingegneria dell’Informazione, sez. Inform...
Nicoletta De Francesco, Giuseppe Lettieri, Luca Ma...