Sciweavers

20175 search results - page 94 / 4035
» Is abstraction the key to computing
Sort
View
79
Voted
MDAI
2007
Springer
15 years 6 months ago
A Public-Key Protocol for Social Networks with Private Relationships
Abstract. The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks...
Josep Domingo-Ferrer
60
Voted
SIGGRAPH
1995
ACM
15 years 4 months ago
Automated learning of muscle-actuated locomotion through control abstraction
Control Abstraction Radek Grzeszczuk and Demetri Terzopoulos Department of Computer Science, University of Toronto 1
Radek Grzeszczuk, Demetri Terzopoulos
TCC
2010
Springer
170views Cryptology» more  TCC 2010»
15 years 9 months ago
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
Abstract. We propose a semantically-secure public-key encryption scheme whose security is polynomialtime equivalent to the hardness of solving random instances of the subset sum pr...
Vadim Lyubashevsky, Adriana Palacio, Gil Segev
ISCAS
2007
IEEE
132views Hardware» more  ISCAS 2007»
15 years 7 months ago
Public-Key Cryptography on the Top of a Needle
Abstract— This work describes the smallest known hardware implementation for Elliptic/Hyperelliptic Curve Cryptography (ECC/HECC). We propose two solutions for Publickey Cryptogr...
Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart P...
102
Voted
CRYPTO
2003
Springer
95views Cryptology» more  CRYPTO 2003»
15 years 5 months ago
Plaintext Awareness via Key Registration
Abstract. In this paper, we reconsider the notion of plaintext awareness. We present a new model for plaintext-aware encryption that is both natural and useful. We achieve plaintex...
Jonathan Herzog, Moses Liskov, Silvio Micali