• Aucun résultat trouvé

secure two-party computation

Developing a cloud-based secure computation platform for genomics research

Developing a cloud-based secure computation platform for genomics research

... forked secure GWAS codebase was adding support for multiple input ...the secure GWAS pipeline so that during the data sharing stage, the computing parties would be able to receive and save secret-shared ...

88

Secure Multi-Party Computation and Privacy

Secure Multi-Party Computation and Privacy

... evaluate two parallel sub-circuits with different topolo- gies (for example the topologies of ...the two results is returned (let c represent this ...the two sub-circuits has returned the ...

167

Practical and Foundational Aspects of Secure Computation

Practical and Foundational Aspects of Secure Computation

... can two millionaires learn who is the richest when neither is willing to tell the other how rich he is? How can satellite collisions be prevented when the trajectories are secret? How can researchers establish ...

144

HLLC-type Riemann solver with approximated two-phase contact for the computation of the Baer-Nunziato two-fluid model

HLLC-type Riemann solver with approximated two-phase contact for the computation of the Baer-Nunziato two-fluid model

... the two-phase contact in each ...the two-phase ...the two-phase contact has a minor impact on the overall accuracy of the solver on this ...those two schemes can only be seen on very fine ...

39

Secure the Clones - Static Enforcement of Policies for Secure Object Copying

Secure the Clones - Static Enforcement of Policies for Secure Object Copying

... an inlined implementation of multiple deep copy methods for half a dozen fields can be rewritten to dispatch these functionalities to the relevant classes, while retaining the ex- pected copy policy. This is made ...

21

A Birthday Party Frame System

A Birthday Party Frame System

... This paper is an experimental investigation of the utility of the MIT-AI frames system. Using this system, a birthday party planning system was written, representin[r] ...

23

Subjective rating of party walls

Subjective rating of party walls

... Subjective rating of party walls Bradley, J. S. https://publications-cnrc.canada.ca/fra/droits L’accès à ce site Web et l’utilisation de son contenu sont assujettis aux conditions présentées dans le site LISEZ CES ...

13

Virtual Secure Mode: Initialization

Virtual Secure Mode: Initialization

... Technology Domain The operating system in focus is Windows 10, build 1607, 64-bit, long-term servicing branch (LTSB). 1 Introduction This section described the process for VSM initialization activities performed by the ...

11

Synthesising Secure APIs

Synthesising Secure APIs

... for any a ∈ Agent and S int = S. 3 Presentation of the Generic API We design an API that allows users to store secret data inside a secure compo- nent or tamper-resistant device (TRD). A user should never have ...

28

Secure the Clones

Secure the Clones

... Several issues merit further investigations in order to develop a full-fledged software security verification tool. The extension of the policy language to be able to impose policies on fields defined in sub-classes ...

31

Synthesizing secure protocols

Synthesizing secure protocols

... Lowe’s definition of injective agreement: “We say that a protocol guarantees to an initiator A agreement of another agent B on a set of data items ds if, whenever A acting as an initiato[r] ...

36

Computation

Computation

... de computation philologique, deux branches à l’histoire longue méritent d’être distinguée, l’une se préoccupant de «basse critique», c’est- à-dire de démarche ecdotique, et de collation comme de stemmatologie, et ...

9

Estimation of crack opening from a two-dimensional continuum-based finite element computation

Estimation of crack opening from a two-dimensional continuum-based finite element computation

... to two-dimensional ...discontinuity. Two estimates have been considered: In the strong approach, the maxima of the profiles are assumed to be equal; in the weak approach, the integrals of each profile are set ...

19

Secure Joins with MapReduce

Secure Joins with MapReduce

... the secure pseudo random function f and on the IND-CPA public key encryption ...a secure pseudo random function and Π is an IND-CPA public key encryption scheme, the CRSP cascade and the CRSP hypercube ...

18

Implementation Software to Secure Virtual Machines with Remote Grid of Secure Elements

Implementation Software to Secure Virtual Machines with Remote Grid of Secure Elements

... a secure solution for VM connection, which aims to develop a highly secure identification scheme, for Cloud Computing, based on the secure elements (smart cards and grid of secure ...of ...

7

Computation Research

Computation Research

... Pennell, "Further Computations Using Newton's Method for Finding Com- plex Roots of a Transcendental Equation," Quarterly Progress Report No.. 81, Research Labo[r] ...

14

Computation Research

Computation Research

... Work has been progressing on the MAD and FORTRAN IV version of ROOTS, a polynomial-with-complex-coefficients-root-finding subroutine. This testing is done outside the [r] ...

10

Computation Research

Computation Research

... The ease of solution of numerical problems by means of a digital computer is often lessened by necessary prior tedious mathematical manipulations such as the exam[r] ...

4

Computation Research

Computation Research

... The data format of such tapes is typically incompatible with Fortran IV (release 11 and higher) standard binary tape format, which requires two full-words of contr[r] ...

6

Computation Research

Computation Research

... In a recent paper on solving nonlinear equations, Kizner outlines a method that raises the order of convergence without calculating derivatives of higher order or [r] ...

6

Show all 4797 documents...

Sujets connexes