A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares
2016
Theoretical Computer Science
In this paper, we construct practical fully distributed (the private key is born distributed), non-interactive schemeswhere the servers can compute their partial signatures without communication with other ...
Threshold cryptography is a fundamental distributed computational paradigm for enhancing the availability and the security of cryptographic public-key schemes. ...
They also suggested an adaptively secure and non-interactive threshold variant [54] of a signature scheme due to Lewko and Waters [51] . ...
doi:10.1016/j.tcs.2016.02.031
fatcat:uapzsvlikzfmtlxwqkklvap6em
Quantum Cryptography: Key Distribution and Beyond
2017
Quanta
We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications.</p><p>Quanta 2017; 6: 1–47.</p> ...
We first begin with a short introduction of classical fiber optical communication [313, 314] and then its adaptation for quantum communication. ...
But even a classical client can perform blind quantum computation by interacting with two entangled (but non-communicating) servers. ...
doi:10.12743/quanta.v6i1.57
fatcat:nwczh5zqjjch3abhrpcjb34ry4
Wireless Sensor Network Security
2013
International Journal of Distributed Sensor Networks
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section ...
The user thereof uses the information at its sole risk and liability.
References ...
with services that are not fully trusted. ...
doi:10.1155/2013/362385
fatcat:2ph46uukonbtbdkc5q6t4mvgcq
Autonomic Response to Distributed Denial of Service Attacks
[chapter]
2001
Lecture Notes in Computer Science
Acknowledgements The authors would like to thank Jack Oden for distilling and Mary Ellen Leishear for editing the original report into this article. ...
This result was borne out in our testing, with some small variance. ...
Temporal/Interaction constraints are specified based on the permitted interaction between processes and shared resources. This constraint type includes atomicity, serialization, and mutual exclusion. ...
doi:10.1007/3-540-45474-8_9
fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm
Beyond Bitcoin: Recent Trends and Perspectives in Distributed Ledger Technology
2021
Cryptography
In the last four years, the evolution and adoption of blockchain and, more generally, distributed ledger systems have shown the affirmation of many concepts and models with significant differences in system ...
This work aims to analyze distributed ledger technology (DLT) critically. ...
Acknowledgments: We wish to thank the anonymous reviewers, whose comments and suggestions allowed to improve the presentation of our work. ...
doi:10.3390/cryptography5040036
fatcat:hy4432onvjhwdoqfa6hscx3e6q
The Case of Diem: A Distributed Ledger Technology-based Alternative Financial Infrastructure Built by a Centralised Multisided Platform
2021
Zenodo
run and operated on distributed ledger technology (DLT), with computer nodes distributed across different jurisdictions. ...
In pursuing its declared mission "to enable a simple global currency and financial infrastructure with a safe, secure and compliant payment system that empowers billions of people," Diem encounters apparent ...
and short-term government securities. ...
doi:10.5281/zenodo.5833740
fatcat:dvg4xmuu2rc3lbeu5cwihhtniq
A Distributed Cognitive Map for Spatial Navigation Based on Graphically Organized Place Agents
2008
Frontiers in Neuroinformatics
Animals quickly acquire spatial knowledge and are thereby able to navigate over very large regions. ...
We have now developed a novel system for mobile robotic navigation that like its biological counterpart decomposes explored space into a distributed graphical network of behaviorally significant places ...
Finally, for a robot that shall operate in vastly different environments such a threshold might best be learned and adapted based on feedback from the environment: a wrong fusion leads to non-traversable ...
doi:10.3389/conf.neuro.11.2008.01.092
fatcat:uj53vbxpsjenrfhw7lbmvitfdu
Performance Provisioning and Energy Efficiency in Cloud and Distributed Computing Systems
[article]
2014
arXiv
pre-print
Second, we propose two algorithms for modelling and resource provisioning of MapReduce applications (a well-known parametric distributed framework currently used by Google, Yahoo, Facebook and LinkedIn ...
To evaluate the algorithms, we have conducted extensive simulation and real experiments on a 5-node physical cluster with up to 25 virtual nodes, using both synthetic and real world applications. ...
Raising the value of probability threshold will reduce the number of applications in the candidate pool, and consequently, increases the similarity selection accuracy. ...
arXiv:1405.2523v1
fatcat:zbudvomqg5hjxjwwdovqv4vsla
Allocation of power meters for online load distribution estimation in smart grids
2015
2015 IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA)
Contrary to contemporary practices, this philosophy is compatible with the low data recording and transmitting rates which smart meters are operated with. ...
Unlike other benchmark forecasting models, this non-parametric approach does not introduce any assumptions regarding the system model and is solely based on past observations. ...
This philosophy, which is based on non-parametric machine learning techniques, is automated and adaptable, therefore, being fundamentally compatible with TVPP requirements. ...
doi:10.1109/isgt-asia.2015.7387010
fatcat:z47qbufvd5dfjpnqgtqc2kwjzi
A distributed archival network for process-oriented autonomic long-term digital preservation
2013
Proceedings of the 13th ACM/IEEE-CS joint conference on Digital libraries - JCDL '13
coordinator in a fully distributed network. ...
Replication and Distribution DISTARNET provides a fully distributed environment, where collaborative geographically dispersed organizations can share resources, and through automated processes provide ...
The recovery from the loss of a node, and even multiple nodes at ...
doi:10.1145/2467696.2467710
dblp:conf/jcdl/SuboticRS13
fatcat:2hsnqk22h5gqzicp3braleosja
Secure and flexible framework for decentralized social network services
2010
2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
Nevertheless, the development of social network applications on decentralized layers involves several new security and design issues. ...
Important features for social applications like reputation management, modular expandability of the application suite and discretionary access control to shared resources can be easily implemented on our ...
Social tagging systems were born in a centralized context, but some distributed solutions have been recently proposed (e.g. [14] ). ...
doi:10.1109/percomw.2010.5470506
dblp:conf/percom/AielloR10
fatcat:7aroskzayfbghmlor3miziaomi
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
[chapter]
2013
Lecture Notes in Computer Science
data (i.e., combining secure computation and authenticated computation to allow reliable and secure cloud storage and computation, while freeing the client from retaining cleartext storage). ...
Then, we give a generic construction of non-malleable (and actually simulation-sound) commitment from any linearly homomorphic SPS. ...
Acknowledgments The authors thank Dario Catalano for his comments and for pointing a necessary correction in the proof of Lemma 1. ...
doi:10.1007/978-3-642-40084-1_17
fatcat:tylkt7dnezaahcojhwdeq3rjaa
Linearly homomorphic structure-preserving signatures and their applications
2015
Designs, Codes and Cryptography
data (i.e., combining secure computation and authenticated computation to allow reliable and secure cloud storage and computation, while freeing the client from retaining cleartext storage). ...
Then, we give a generic construction of non-malleable (and actually simulation-sound) commitment from any linearly homomorphic SPS. ...
Acknowledgments The authors thank Dario Catalano for his comments and for pointing a necessary correction in the proof of Lemma 1. ...
doi:10.1007/s10623-015-0079-1
fatcat:ewmdi6swcnftfcf6acissydhq4
The Fourier Theory of Vision
2001
Perception
Non-classical surround zones with complex interacting properties would not be revealed because they are covered by the single overall grating pattern. ...
Fourier arguments in vision that deal only with power spectra fall short of this goal because an image cannot be fully reconstructed from the power, ie the square of the amplitude, in the Fourier spectrum ...
doi:10.1068/p3193
pmid:11430239
fatcat:zh4x6fl7xnatjnlcdcw2yjsk34
Fitting the integrated spectral energy distributions of galaxies
2010
Astrophysics and Space Science
The present review will be made available on an interactive, moderated web page (sedfitting.org), where the community can access and change the text. ...
Model predictions and fitting procedures have improved significantly over this time, attempting to keep up with the vastly increased volume and quality of available data. ...
We would like to thank the participants in the workshop for their motivation and for sharing their expertise, without which this review could not have been written. ...
doi:10.1007/s10509-010-0458-z
fatcat:h7go2rphlrejfns74seur3hd3a
« Previous
Showing results 1 — 15 out of 6,258 results