Sciweavers

620 search results - page 112 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
AGENTS
2001
Springer
15 years 2 months ago
Monitoring deployed agent teams
Recent years are seeing an increasing need for on-line monitoring of deployed distributed teams of cooperating agents, e.g., for visualization, or performance tracking. However, i...
Gal A. Kaminka, David V. Pynadath, Milind Tambe
RAID
1999
Springer
15 years 1 months ago
Session State Transition Based Large Network IDS
In order to present large-scale malicious attacks on an ISP network to maintain network services, we have designed a method to record key packets classified by sessions. Session i...
Qianli Zhang, Xing Li
EUROCRYPT
1990
Springer
15 years 1 months ago
Experimental Quantum Cryptography
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a ran...
Charles H. Bennett, François Bessette, Gill...
CRYPTO
2010
Springer
208views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Improved Delegation of Computation Using Fully Homomorphic Encryption
Following Gennaro, Gentry, and Parno (Cryptology ePrint Archive 2009/547), we use fully homomorphic encryption to design improved schemes for delegating computation. In such schem...
Kai-Min Chung, Yael Kalai, Salil P. Vadhan
BMCBI
2006
130views more  BMCBI 2006»
14 years 9 months ago
An interactive visualization tool to explore the biophysical properties of amino acids and their contribution to substitution ma
Background: Quantitative descriptions of amino acid similarity, expressed as probabilistic models of evolutionary interchangeability, are central to many mainstream bioinformatic ...
Blazej Bulka, Marie desJardins, Stephen J. Freelan...