Sciweavers

298 search results - page 12 / 60
» ideal 2010
Sort
View
CORR
2010
Springer
86views Education» more  CORR 2010»
14 years 8 months ago
Secure Multiparty Computation with Partial Fairness
A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation where parties give their inputs to a truste...
Amos Beimel, Eran Omri, Ilan Orlov
TRUST
2010
Springer
15 years 2 months ago
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
Ernie Brickell, Jiangtao Li
ENTCS
2010
130views more  ENTCS 2010»
14 years 9 months ago
Compositional System Security with Interface-Confined Adversaries
This paper presents a formal framework for compositional reasoning about secure systems. A key insight is to view a trusted system in terms of the interfaces that the various comp...
Deepak Garg, Jason Franklin, Dilsun Kirli Kaynar, ...
DPHOTO
2010
127views Hardware» more  DPHOTO 2010»
14 years 9 months ago
Visibility of uncorrelated image noise
In this study, we evaluated the effect that pixel size has upon people's preferences for images. We used multispectral images of faces as the scene data and simulated the res...
Jiajing Xu, Reno Bowen, Jing Wang, Joyce E. Farrel...
75
Voted
PPSN
2010
Springer
14 years 8 months ago
Optimisation and Generalisation: Footprints in Instance Space
Abstract. The chief purpose of research in optimisation is to understand how to design (or choose) the most suitable algorithm for a given distribution of problem instances. Ideall...
David W. Corne, Alan P. Reynolds