Sciweavers

3190 search results - page 44 / 638
» cans 2011
Sort
View
ASIACRYPT
2011
Springer
14 years 14 days ago
Short Signatures from Weaker Assumptions
We provide constructions of (m, 1)-programmable hash functions (PHFs) for m ≥ 2. Mimicking certain programmability properties of random oracles, PHFs can, e.g., be plugged into ...
Dennis Hofheinz, Tibor Jager, Eike Kiltz
107
Voted
TMC
2011
201views more  TMC 2011»
14 years 7 months ago
Data Delivery Properties of Human Contact Networks
—Pocket Switched Networks take advantage of social contacts to opportunistically create data paths over time. This work employs empirical traces to examine the effect of the huma...
Nishanth Sastry, D. Manjunath, Karen R. Sollins, J...
126
Voted
CANS
2011
Springer
258views Cryptology» more  CANS 2011»
14 years 14 days ago
Fast Computation on Encrypted Polynomials and Applications
In this paper, we explore fast algorithms for computing on encrypted polynomials. More specifically, we describe efficient algorithms for computing the Discrete Fourier Transform,...
Payman Mohassel
PEPM
2011
ACM
14 years 3 months ago
Ordering multiple continuations on the stack
Passing multiple continuation arguments to a function in CPS form allows one to encode a wide variety of direct-style control constructs, such as conditionals, exceptions, and mul...
Dimitrios Vardoulakis, Olin Shivers
ACL
2012
13 years 2 months ago
SITS: A Hierarchical Nonparametric Model using Speaker Identity for Topic Segmentation in Multiparty Conversations
One of the key tasks for analyzing conversational data is segmenting it into coherent topic segments. However, most models of topic segmentation ignore the social aspect of conver...
Viet-An Nguyen, Jordan L. Boyd-Graber, Philip Resn...