Sciweavers

7741 search results - page 1548 / 1549
» Security in Active Networks
Sort
View
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 4 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
ESWA
2011
220views Database» more  ESWA 2011»
12 years 9 months ago
Unsupervised neural models for country and political risk analysis
This interdisciplinary research project focuses on relevant applications of Knowledge Discovery and Artificial Neural Networks in order to identify and analyse levels of country, b...
Álvaro Herrero, Emilio Corchado, Alfredo Ji...
EUROCRYPT
2012
Springer
11 years 8 months ago
Fully Homomorphic Encryption with Polylog Overhead
We show that homomorphic evaluation of (wide enough) arithmetic circuits can be accomplished with only polylogarithmic overhead. Namely, we present a construction of fully homomorp...
Craig Gentry, Shai Halevi, Nigel P. Smart
EUROSYS
2006
ACM
14 years 3 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
BMCBI
2010
90views more  BMCBI 2010»
13 years 6 months ago
PuTmiR: A database for extracting neighboring transcription factors of human microRNAs
Background: Some of the recent investigations in systems biology have revealed the existence of a complex regulatory network between genes, microRNAs (miRNAs) and transcription fa...
Sanghamitra Bandyopadhyay, Malay Bhattacharyya
« Prev « First page 1548 / 1549 Last » Next »