نتایج جستجو برای: secure sets
تعداد نتایج: 266654 فیلتر نتایج به سال:
Supporting security-oriented, inter-disciplinary research: crossing the social, clinical and geospatial domains. How many people have had a chronic disease for longer than 5-years in Scotland? How has this impacted upon their choices of employment? Are there any geographical clusters in Scotland where a high-incidence of patients with such long-term illness can be found? How does the life expec...
The paper analyses the multiple assignment secret sharing scheme, presented at the GLOBECOM'87 Conference. It contains three technical comments and a contribution to extend the capabilities of Shamir scheme. First it is proved that the proposed multiple assignment secret sharing scheme is not perfect. In fact, the non-perfectness of the scheme is due to the non-perfectness of a certain type of ...
Private set intersection (PSI) refers to a special case of secure two-party computation in which the parties each have a set of items and compute the intersection of these sets without revealing any additional information. In this paper we present improvements to practical PSI providing security in the presence of malicious adversaries. Our starting point is the protocol of Dong, Chen & Wen (CC...
Correlated private randomness, or correlation in short, is a fundamental cryptographic resource that helps parties compute securely over their private data. An offline preprocessing step, which is independent of the eventual secure computation, generates correlated secret shares for the parties and the parties use these shares during the final secure computation step. However, these secret shar...
With the evolution of data collection ways, it is possible to produce abundant data described by multiple feature sets. Previous studies show that including more features does not necessarily bring positive effect. How to prevent the augmented features worsening classification performance is crucial but rarely studied. In this paper, we study this challenging problem by proposing a secure class...
Ulrich Höhle was born on 6 December 1943 in Bad Oeynhausen, Germany. Being musically and mathematically gifted (among others), he could not decide between music and mathematics, so he began his studies in both directions: mathematics and music (piano) at Johannes-Gutenberg Universität in Mainz (1963–1966). After having realized his true vocation, he decided to become a mathematician and continu...
Whenever a functional is concave it is natural to ask whether its sendograph is a closed convex set. If so, the Hahn–Banach theory implies that the functional can be represented as the infimum of all continuous linear functionals greater than or equal to it. We refer to such representation as a dual representation. Dominated convergence of the concave integral for capacities is characterized in...
To have a real option means to have the possibility for a certain period to either choose for or against making an invetsment decision, without binding oneself up front. The real option rule is that one should invest today only if the net present value is high enough to compensate for giving up the value of the option to wait. Because the option to invest loses its value when the investment is ...
This paper investigates the approximation behaviour of the K1 oczy–Hirota (KH) interpolative fuzzy controllers. First, in accordance with the remarks in (Fuzzy Sets and Systems 125(1) (2002) 105), it is pointed out that it is a fuzzy generalization of the Shepard operator. Shepard operator has thoroughly studied by approximation theorist since the mid-1970s. Exploiting the aforementioned relati...
In many applications, multiple correlation and partial correlation for three or more fuzzy sets are very important, but Chiang and Lin (1999, Fuzzy Sets and Systems 102: 221–226) do not solve this problem. Here, we propose a method to calculate the multiple correlation and partial correlation for fuzzy data, by adopting the concepts from the multivariate correlation model. In order to fit into ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید