Sciweavers

1195 search results - page 175 / 239
» New constructions of SSPDs and their applications
Sort
View
POPL
2012
ACM
13 years 5 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
CVPR
2012
IEEE
13 years 9 days ago
Center-Shift: An approach towards automatic robust mesh segmentation (ARMS)
In the area of 3D shape analysis, research in mesh segmentation has always been an important topic, as it is a fundamental low-level task which can be utilized in many application...
Mengtian Sun, Yi Fang, Karthik Ramani
EUROCRYPT
2012
Springer
13 years 8 days ago
Property Preserving Symmetric Encryption
Abstract. Processing on encrypted data is a subject of rich investigation. Several new and exotic encryption schemes, supporting a diverse set of features, have been developed for ...
Omkant Pandey, Yannis Rouselakis
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 4 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
ICFP
2005
ACM
15 years 9 months ago
High-level views on low-level representations
This paper explains how the high-level treatment of datatypes in functional languages--using features like constructor functions and pattern matching--can be made to coexist with ...
Iavor S. Diatchki, Mark P. Jones, Rebekah Leslie