Results 11 to 20 of about 6,988 (254)

Depth optimized efficient homomorphic sorting [PDF]

open access: yes, 2015
We introduce a sorting scheme which is capable of efficiently sorting encrypted data without the secret key. The technique is obtained by focusing on the multiplicative depth of the sorting circuit alongside the more traditional metrics such as number of
A Chatterjee   +8 more
core   +1 more source

Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully homomorphic encryption by integrating a specific symmetric encryption scheme, which requires selected symmetric encryption scheme that ...
Benqiang Wei   +5 more
doaj   +1 more source

Implementing Standardization Education at the National Level [PDF]

open access: yesInternational Journal of IT Standards and Standardization Research, 2011
This paper explores how standardization education can be implemented at the national level. Previous studies form the main source for the paper. This research shows that implementation of standardization in the national education system requires policy at the national level, a long term investment in support, and cooperation between industry ...
openaire   +3 more sources

Easy, fast and reproducible Stochastic Cellular Automata with chouca

open access: yesPeer Community Journal
Stochastic cellular automata (SCA) are models that describe spatial dynamics using a grid of cells that switch between discrete states over time. They are widely used to understand how small-scale processes scale up to affect ecological dynamics at ...
Génin, Alexandre   +6 more
doaj   +1 more source

mod_oai: An Apache Module for Metadata Harvesting

open access: yes, 2005
We describe mod_oai, an Apache 2.0 module that implements the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). OAIPMH is the de facto standard for metadata exchange in digital libraries and allows repositories to expose their contents
Harrison, Terry L.   +4 more
core   +1 more source

Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications [PDF]

open access: yes, 2017
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs.
Koushanfar, Farinaz   +5 more
core   +2 more sources

Why and When Are Evidence‐Based Interventions Adopted in Paediatric Supportive Care? A Qualitative Exploration of the Determinants of Photobiomodulation Implementation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie   +4 more
wiley   +1 more source

Context-Committing Security of Leveled Leakage-Resilient AEAD

open access: yesIACR Transactions on Symmetric Cryptology
During recent years, research on authenticated encryption has been thriving through two highly active and practically motivated research directions: provable leakage resilience and key- or context-commitment security.
Chandranan Dhar   +5 more
doaj   +1 more source

Navigace mobilních robotů v neznámém prostředí s využitím měření vzdáleností [PDF]

open access: yes, 2008
The ability of a robot to navigate itself in the environment is a crucial step towards its autonomy. Navigation as a subtask of the development of autonomous robots is the subject of this thesis, focusing on the development of a method for simultaneous ...
Jež, Ondřej
core  

Deterministic Black-Box Identity Testing $\pi$-Ordered Algebraic Branching Programs [PDF]

open access: yes, 2010
In this paper we study algebraic branching programs (ABPs) with restrictions on the order and the number of reads of variables in the program. Given a permutation $\pi$ of $n$ variables, for a $\pi$-ordered ABP ($\pi$-OABP), for any directed path $p ...
Jansen, Maurice   +2 more
core   +4 more sources

Home - About - Disclaimer - Privacy