Sciweavers

6650 search results - page 1249 / 1330
» models 2009
Sort
View
113
Voted
STOC
2009
ACM
181views Algorithms» more  STOC 2009»
16 years 1 months ago
The detectability lemma and quantum gap amplification
The quantum analog of a constraint satisfaction problem is a sum of local Hamiltonians - each (term of the) Hamiltonian specifies a local constraint whose violation contributes to...
Dorit Aharonov, Itai Arad, Zeph Landau, Umesh V. V...
128
Voted
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 1 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
104
Voted
RECOMB
2009
Springer
16 years 1 months ago
Shared Peptides in Mass Spectrometry Based Protein Quantification
In analyzing the proteome using mass spectrometry, the mass values help identify the molecules, and the intensities help quantify them, relative to their abundance in other sample...
Banu Dost, Nuno Bandeira, Xiangqian Li, Zhouxin Sh...
ESORICS
2009
Springer
16 years 1 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
ESORICS
2009
Springer
16 years 1 months ago
Dynamic Enforcement of Abstract Separation of Duty Constraints
Separation of Duty Constraints David Basin1 , Samuel J. Burri1,2 , and G?unter Karjoth2 1 ETH Zurich, Department of Computer Science, Switzerland 2 IBM Research, Zurich Research La...
David A. Basin, Günter Karjoth, Samuel J. Bur...
« Prev « First page 1249 / 1330 Last » Next »