Sciweavers

1173 search results - page 120 / 235
» On the Compositionality of Round Abstraction
Sort
View
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
15 years 6 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
109
Voted
CTRSA
2008
Springer
137views Cryptology» more  CTRSA 2008»
15 years 2 months ago
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before ...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
BMCBI
2005
161views more  BMCBI 2005»
15 years 18 days ago
Non-linear mapping for exploratory data analysis in functional genomics
Background: Several supervised and unsupervised learning tools are available to classify functional genomics data. However, relatively less attention has been given to exploratory...
Francisco Azuaje, Haiying Wang, Alban Chesneau
112
Voted
CHI
2011
ACM
14 years 4 months ago
MOGCLASS: evaluation of a collaborative system of mobile devices for classroom music education of young children
Composition, listening, and performance are essential activities in classroom music education, yet conventional music classes impose unnecessary limitations on students’ ability...
Yinsheng Zhou, Graham Percival, Xinxi Wang, Ye Wan...
ESCIENCE
2005
IEEE
15 years 6 months ago
Publishing Persistent Grid Computations as WS Resources
Abstract Grid services can be composed into processes, providing a high level definition of the computations involved in terms of their data exchanges and control flow dependenci...
Thomas Heinis, Cesare Pautasso, Oliver Deak, Gusta...