The GBD project

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of the GBD Cryptosystem

We present our experience from implementing the public-key cryptosystem of González, Boyd and Dawson. We discuss different computational methods and compare their relative efficiency experimentally. We also compare the efficiency of this cryptosystem with that of the ElGamal cipher.

متن کامل

Crafting GBD-Net for Object Detection

The visual cues from multiple support regions of different sizes and resolutions are complementary in classifying a candidate box in object detection. Effective integration of local and contextual visual cues from these regions has become a fundamental problem in object detection. In this paper, we propose a gated bi-directional CNN (GBD-Net) to pass messages among features from different suppo...

متن کامل

Mapping EQ-5D utilities to GBD 2010 and GBD 2013 disability weights: results of two pilot studies in Belgium

BACKGROUND Utilities and disability weights (DWs) are metrics used for calculating Quality-Adjusted Life Years and Disability-Adjusted Life Years (DALYs), respectively. Utilities can be obtained with multi-attribute instruments such as the EuroQol 5 dimensions questionnaire (EQ-5D). In 2010 and 2013, Salomon et al. proposed a set of DWs for 220 and 183 health states, respectively. The objective...

متن کامل

GBD Threshold Cryptography with an Application to RSA Key Recovery

We present protocols for threshold cryptography in the GBD public-key cryptosystem. Both threshold decryption and threshold key generation are covered, in the “honest-butcurious” setting. This shows that it is possible to perform GBD computations in a distributed manner during both key generation and decryption, without revealing the private key to any party. GBD threshold decryption is similar...

متن کامل

GBD Threshold Cryptography with an Application to RSA Key Recovery

We present protocols for threshold decryption and threshold key generation in the GBD public-key cryptosystem in the “honest-butcurious” setting. These allow GBD computations to be performed in a distributed manner during both key generation and decryption, without revealing the private key to any party. GBD threshold decryption is similar to El-Gamal threshold decryption. GBD threshold key gen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: European Journal of Public Health

سال: 2019

ISSN: 1101-1262,1464-360X

DOI: 10.1093/eurpub/ckz185.107