Sciweavers

250 search results - page 18 / 50
» Modeling Public Key Infrastructures in the Real World
Sort
View
106
Voted
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
15 years 7 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
125
Voted
EJWCN
2010
115views more  EJWCN 2010»
14 years 8 months ago
Efficient Certification Path Discovery for MANET
A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitio...
Georgios Kambourakis, Elisavet Konstantinou, Anast...
153
Voted
IACR
2011
196views more  IACR 2011»
14 years 1 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
116
Voted
CORR
2010
Springer
208views Education» more  CORR 2010»
15 years 2 months ago
MapReduce for Integer Factorization
Abstract. Integer factorization is a very hard computational problem. Currently no ecient algorithm for integer factorization is publicly known. However, this is an important probl...
Javier Tordable
117
Voted
INCDM
2010
Springer
172views Data Mining» more  INCDM 2010»
15 years 10 days ago
Evaluating the Quality of Clustering Algorithms Using Cluster Path Lengths
Many real world systems can be modeled as networks or graphs. Clustering algorithms that help us to organize and understand these networks are usually referred to as, graph based c...
Faraz Zaidi, Daniel Archambault, Guy Melanç...