نتایج جستجو برای: secure sets

تعداد نتایج: 266654  

2002
Ashwin Machanavajjhala K. Srinathan C. Pandu Rangan

We initiate the study of perfectly secure multiparty computation over asynchronous networks tolerating generalized adversaries. The classical results in information-theoretically secure asynchronous multiparty computation among n players state that less than n4 active adversaries can be tolerated in the perfect setting [4]. Strictly generalizing these results to the non-threshold setting, we sh...

2008
Dave Tahmoush Hanan Samet

Building effective Computer-Aided Detection and Diagnosis (CAD) systems involves the combination of running experiments, image markup, security, analysis, evaluation, feature extraction, and feature combination in order to capture and evaluate medical images effectively. This requires the involvement of a large community of experts across several fields. We have created a CAD development system...

2011
Zhiqian Xu Keith Martin Clifford L. Kotnik

The rapid growth of data and data sharing have been driven an evolution in distributed storage infrastructure. The need for sensitive data protection and the capacity to handle massive data sets have encouraged the research and development of secure and scalable storage systems. This paper identifies major security issues and requirements of data protection related to distributed data storage s...

Journal: :Softw., Pract. Exper. 1987
Per Brinch Hansen

This paper describes a secure programming language called Joyce based on CSP and Pascal. Joyce permits unbounded (recursive) activation of communicating agents. The agents exchange messages through synchronous channels. A channel can transfer messages of different types between two or more agents. A compiler can check message types and ensure that agents use disjoint sets of variables only. The...

Journal: :IACR Cryptology ePrint Archive 2013
Paul Baecher Pooya Farshim Marc Fischlin Martijn Stam

Preneel et al. (Crypto 1993) assessed 64 possible ways to construct a compression function out of a blockcipher. They conjectured that 12 out of these 64 so-called PGV constructions achieve optimal security bounds for collision resistance and preimage resistance. This was proven by Black et al. (Journal of Cryptology, 2010), if one assumes that the blockcipher is ideal. This result, however, do...

Journal: :Health informatics journal 2008
Richard O. Sinnott Anthony Stell Oluwafemi O. Ajayi

A computational infrastructure to underpin complex clinical trials and medical population studies is highly desirable. This should allow access to a range of distributed clinical data sets; support the efficient processing and analysis of the data obtained; have security at its heart; and ensure that authorized individuals are able to see privileged data and no more. Each clinical trial has its...

Journal: :Social Science Research Network 2021

Adoption of artificial intelligence medical imaging applications is often impeded by barriers between healthcare systems and algorithm developers given that access to both private patient data commercial model IP important perform pre-deployment evaluation. This work investigates a framework for secure, privacy-preserving AI-enabled inference using CrypTFlow2, state-of-the-art end-to-end compil...

Journal: :CoRR 2017
Alessandro Neri Joachim Rosenthal Davide Schipani

Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric. Aim of this paper is to show other models and algorithms of secure fuzzy authentication, which can be performed using the rank metric. A few schemes are presented which can...

Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.

2010
Falko Strenzke

In this paper we present a smart card implementation of the quantum computer resistant McEliece Public Key Cryptosystem (PKC) on an Infineon SLE76 chip. We describe the main features of the implementation which focuses on performance optimization. We give the resource demands and timings for two sets of security parameters, the higher one being in the secure domain. The timings suggest the usab...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید