Results 11 to 20 of about 6,988 (254)
Depth optimized efficient homomorphic sorting [PDF]
We introduce a sorting scheme which is capable of efficiently sorting encrypted data without the secret key. The technique is obtained by focusing on the multiplicative depth of the sorting circuit alongside the more traditional metrics such as number of
A Chatterjee +8 more
core +1 more source
Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully homomorphic encryption by integrating a specific symmetric encryption scheme, which requires selected symmetric encryption scheme that ...
Benqiang Wei +5 more
doaj +1 more source
Implementing Standardization Education at the National Level [PDF]
This paper explores how standardization education can be implemented at the national level. Previous studies form the main source for the paper. This research shows that implementation of standardization in the national education system requires policy at the national level, a long term investment in support, and cooperation between industry ...
openaire +3 more sources
Easy, fast and reproducible Stochastic Cellular Automata with chouca
Stochastic cellular automata (SCA) are models that describe spatial dynamics using a grid of cells that switch between discrete states over time. They are widely used to understand how small-scale processes scale up to affect ecological dynamics at ...
Génin, Alexandre +6 more
doaj +1 more source
mod_oai: An Apache Module for Metadata Harvesting
We describe mod_oai, an Apache 2.0 module that implements the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). OAIPMH is the de facto standard for metadata exchange in digital libraries and allows repositories to expose their contents
Harrison, Terry L. +4 more
core +1 more source
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications [PDF]
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs.
Koushanfar, Farinaz +5 more
core +2 more sources
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie +4 more
wiley +1 more source
Context-Committing Security of Leveled Leakage-Resilient AEAD
During recent years, research on authenticated encryption has been thriving through two highly active and practically motivated research directions: provable leakage resilience and key- or context-commitment security.
Chandranan Dhar +5 more
doaj +1 more source
Navigace mobilních robotů v neznámém prostředí s využitím měření vzdáleností [PDF]
The ability of a robot to navigate itself in the environment is a crucial step towards its autonomy. Navigation as a subtask of the development of autonomous robots is the subject of this thesis, focusing on the development of a method for simultaneous ...
Jež, Ondřej
core
Deterministic Black-Box Identity Testing $\pi$-Ordered Algebraic Branching Programs [PDF]
In this paper we study algebraic branching programs (ABPs) with restrictions on the order and the number of reads of variables in the program. Given a permutation $\pi$ of $n$ variables, for a $\pi$-ordered ABP ($\pi$-OABP), for any directed path $p ...
Jansen, Maurice +2 more
core +4 more sources

