Sciweavers

172 search results - page 19 / 35
» Key agreement from weak bit agreement
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 18 hour ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
63
Voted
TSD
2009
Springer
15 years 4 months ago
Analysis and Assessment of AvID: Multi-Modal Emotional Database
The paper deals with the recording and the evaluation of a multi modal (audio/video) database of spontaneous emotions. Firstly, motivation for this work is given and different rec...
Rok Gajsek, Vitomir Struc, Bostjan Vesnicer, Anja ...
ICSOC
2007
Springer
15 years 3 months ago
Dynamic Service Provisioning Using GRIA SLAs
Service Level Agreements (SLA) include quality of service (QoS) constraints and bounds that have to be honoured by the service provider. To maximise the Service Provider revenue wh...
Mike J. Boniface, Stephen C. Phillips, Alfonso S&a...
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
15 years 2 months ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert
TCS
2008
14 years 9 months ago
Arbitrary pattern formation by asynchronous, anonymous, oblivious robots
From an engineering point of view, the problem of coordinating a set of autonomous, mobile robots for the purpose of cooperatively performing a task has been studied extensively o...
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro...