Sciweavers

5722 search results - page 352 / 1145
» Security Function Interactions
Sort
View
EVOW
2008
Springer
15 years 5 months ago
Protein Interaction Inference Using Particle Swarm Optimization Algorithm
Many processes in the cell involve interaction among the proteins and determination of the networks of such interactions is of immense importance towards the complete understanding...
Mudassar Iqbal, Alex Alves Freitas, Colin G. Johns...
INTERACT
2003
15 years 5 months ago
InterActor for Human Interaction and Communication Support
: A speech-driven embodied interactive actor called InterActor with both functions of speaker and listener is developed for activating human interaction and communication by genera...
Tomio Watanabe, Masashi Okubo, Ryusei Danbara
FOCS
2003
IEEE
15 years 9 months ago
General Composition and Universal Composability in Secure Multi-Party Computation
Concurrent general composition relates to a setting where a secure protocol is run in a network concurrently with other, arbitrary protocols. Clearly, security in such a setting i...
Yehuda Lindell
TES
2001
Springer
15 years 8 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
ASIACRYPT
2008
Springer
15 years 5 months ago
MPC vs. SFE : Unconditional and Computational Security
Abstract. In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, pa...
Martin Hirt, Ueli M. Maurer, Vassilis Zikas