Sciweavers

977 search results - page 71 / 196
» Secret image sharing
Sort
View
ESORICS
2010
Springer
15 years 5 months ago
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
Collaborative optimization problems can often be modeled as a linear program whose objective function and constraints combine data from several parties. However, important applicat...
Octavian Catrina, Sebastiaan de Hoogh
IJNSEC
2007
154views more  IJNSEC 2007»
15 years 5 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
IJNSEC
2011
78views more  IJNSEC 2011»
15 years 2 days ago
Multi-authority Electronic Voting Scheme Based on Elliptic Curves
In this paper, a new multi authority electronic voting scheme based on elliptic curves is proposed. According to the proposed scheme, each voter casts the vote as a point on the e...
Chinniah Porkodi, Ramalingam Arumuganathan, Krishn...
INFOCOM
2012
IEEE
13 years 7 months ago
Pssst, over here: Communicating without fixed infrastructure
—This paper discusses a way to communicate without relying on fixed infrastructure at some central hub. This can be useful for bootstrapping loosely connected peer-to-peer syste...
Tom Callahan, Mark Allman, Michael Rabinovich
137
Voted
ICCAD
2007
IEEE
123views Hardware» more  ICCAD 2007»
16 years 2 months ago
Mapping model with inter-array memory sharing for multidimensional signal processing
Abstract – The storage requirements in data-intensive signal processing systems (including applications in video and image processing, artificial vision, medical imaging, real-t...
Ilie I. Luican, Hongwei Zhu, Florin Balasa