Sciweavers

250 search results - page 18 / 50
» Modeling Public Key Infrastructures in the Real World
Sort
View
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
15 years 3 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
EJWCN
2010
115views more  EJWCN 2010»
14 years 4 months ago
Efficient Certification Path Discovery for MANET
A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitio...
Georgios Kambourakis, Elisavet Konstantinou, Anast...
IACR
2011
196views more  IACR 2011»
13 years 9 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
CORR
2010
Springer
208views Education» more  CORR 2010»
14 years 9 months ago
MapReduce for Integer Factorization
Abstract. Integer factorization is a very hard computational problem. Currently no ecient algorithm for integer factorization is publicly known. However, this is an important probl...
Javier Tordable
INCDM
2010
Springer
172views Data Mining» more  INCDM 2010»
14 years 8 months ago
Evaluating the Quality of Clustering Algorithms Using Cluster Path Lengths
Many real world systems can be modeled as networks or graphs. Clustering algorithms that help us to organize and understand these networks are usually referred to as, graph based c...
Faraz Zaidi, Daniel Archambault, Guy Melanç...