Filters








6,258 Hits in 7.4 sec

Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares

Benoît Libert, Marc Joye, Moti Yung
2016 Theoretical Computer Science  
In this paper, we construct practical fully distributed (the private key is born distributed), non-interactive schemeswhere the servers can compute their partial signatures without communication with other  ...  Threshold cryptography is a fundamental distributed computational paradigm for enhancing the availability and the security of cryptographic public-key schemes.  ...  They also suggested an adaptively secure and non-interactive threshold variant [54] of a signature scheme due to Lewko and Waters [51] .  ... 
doi:10.1016/j.tcs.2016.02.031 fatcat:uapzsvlikzfmtlxwqkklvap6em

Quantum Cryptography: Key Distribution and Beyond

Akshata Shenoy-Hejamadi, Anirban Pathak, Srikanth Radhakrishna
2017 Quanta  
We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications.</p><p>Quanta 2017; 6: 1–47.</p>  ...  We first begin with a short introduction of classical fiber optical communication [313, 314] and then its adaptation for quantum communication.  ...  But even a classical client can perform blind quantum computation by interacting with two entangled (but non-communicating) servers.  ... 
doi:10.12743/quanta.v6i1.57 fatcat:nwczh5zqjjch3abhrpcjb34ry4

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  The user thereof uses the information at its sole risk and liability. References  ...  with services that are not fully trusted.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Autonomic Response to Distributed Denial of Service Attacks [chapter]

Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid
2001 Lecture Notes in Computer Science  
Acknowledgements The authors would like to thank Jack Oden for distilling and Mary Ellen Leishear for editing the original report into this article.  ...  This result was borne out in our testing, with some small variance.  ...  Temporal/Interaction constraints are specified based on the permitted interaction between processes and shared resources. This constraint type includes atomicity, serialization, and mutual exclusion.  ... 
doi:10.1007/3-540-45474-8_9 fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm

Beyond Bitcoin: Recent Trends and Perspectives in Distributed Ledger Technology

Diego Romano, Giovanni Schmid
2021 Cryptography  
In the last four years, the evolution and adoption of blockchain and, more generally, distributed ledger systems have shown the affirmation of many concepts and models with significant differences in system  ...  This work aims to analyze distributed ledger technology (DLT) critically.  ...  Acknowledgments: We wish to thank the anonymous reviewers, whose comments and suggestions allowed to improve the presentation of our work.  ... 
doi:10.3390/cryptography5040036 fatcat:hy4432onvjhwdoqfa6hscx3e6q

The Case of Diem: A Distributed Ledger Technology-based Alternative Financial Infrastructure Built by a Centralised Multisided Platform

Golnaz Abdollahi Jafari, Malte-Christian Gruber
2021 Zenodo  
run and operated on distributed ledger technology (DLT), with computer nodes distributed across different jurisdictions.  ...  In pursuing its declared mission "to enable a simple global currency and financial infrastructure with a safe, secure and compliant payment system that empowers billions of people," Diem encounters apparent  ...  and short-term government securities.  ... 
doi:10.5281/zenodo.5833740 fatcat:dvg4xmuu2rc3lbeu5cwihhtniq

A Distributed Cognitive Map for Spatial Navigation Based on Graphically Organized Place Agents

Douglas Rodney
2008 Frontiers in Neuroinformatics  
Animals quickly acquire spatial knowledge and are thereby able to navigate over very large regions.  ...  We have now developed a novel system for mobile robotic navigation that like its biological counterpart decomposes explored space into a distributed graphical network of behaviorally significant places  ...  Finally, for a robot that shall operate in vastly different environments such a threshold might best be learned and adapted based on feedback from the environment: a wrong fusion leads to non-traversable  ... 
doi:10.3389/conf.neuro.11.2008.01.092 fatcat:uj53vbxpsjenrfhw7lbmvitfdu

Performance Provisioning and Energy Efficiency in Cloud and Distributed Computing Systems [article]

Nikzad Babaii Rizvandi
2014 arXiv   pre-print
Second, we propose two algorithms for modelling and resource provisioning of MapReduce applications (a well-known parametric distributed framework currently used by Google, Yahoo, Facebook and LinkedIn  ...  To evaluate the algorithms, we have conducted extensive simulation and real experiments on a 5-node physical cluster with up to 25 virtual nodes, using both synthetic and real world applications.  ...  Raising the value of probability threshold will reduce the number of applications in the candidate pool, and consequently, increases the similarity selection accuracy.  ... 
arXiv:1405.2523v1 fatcat:zbudvomqg5hjxjwwdovqv4vsla

Allocation of power meters for online load distribution estimation in smart grids

Konstantinos Kouzelis, Iker Diaz De Cerio Mendaza, Birgitte Bak-Jensen, Jayakrishnan R. Pillai, Bishnu Prasad Bhattarai
2015 2015 IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA)  
Contrary to contemporary practices, this philosophy is compatible with the low data recording and transmitting rates which smart meters are operated with.  ...  Unlike other benchmark forecasting models, this non-parametric approach does not introduce any assumptions regarding the system model and is solely based on past observations.  ...  This philosophy, which is based on non-parametric machine learning techniques, is automated and adaptable, therefore, being fundamentally compatible with TVPP requirements.  ... 
doi:10.1109/isgt-asia.2015.7387010 fatcat:z47qbufvd5dfjpnqgtqc2kwjzi

A distributed archival network for process-oriented autonomic long-term digital preservation

Ivan Subotic, Lukas Rosenthaler, Heiko Schuldt
2013 Proceedings of the 13th ACM/IEEE-CS joint conference on Digital libraries - JCDL '13  
coordinator in a fully distributed network.  ...  Replication and Distribution DISTARNET provides a fully distributed environment, where collaborative geographically dispersed organizations can share resources, and through automated processes provide  ...  The recovery from the loss of a node, and even multiple nodes at  ... 
doi:10.1145/2467696.2467710 dblp:conf/jcdl/SuboticRS13 fatcat:2hsnqk22h5gqzicp3braleosja

Secure and flexible framework for decentralized social network services

Luca Maria Aiello, Giancarlo Ruffo
2010 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
Nevertheless, the development of social network applications on decentralized layers involves several new security and design issues.  ...  Important features for social applications like reputation management, modular expandability of the application suite and discretionary access control to shared resources can be easily implemented on our  ...  Social tagging systems were born in a centralized context, but some distributed solutions have been recently proposed (e.g. [14] ).  ... 
doi:10.1109/percomw.2010.5470506 dblp:conf/percom/AielloR10 fatcat:7aroskzayfbghmlor3miziaomi

Linearly Homomorphic Structure-Preserving Signatures and Their Applications [chapter]

Benoît Libert, Thomas Peters, Marc Joye, Moti Yung
2013 Lecture Notes in Computer Science  
data (i.e., combining secure computation and authenticated computation to allow reliable and secure cloud storage and computation, while freeing the client from retaining cleartext storage).  ...  Then, we give a generic construction of non-malleable (and actually simulation-sound) commitment from any linearly homomorphic SPS.  ...  Acknowledgments The authors thank Dario Catalano for his comments and for pointing a necessary correction in the proof of Lemma 1.  ... 
doi:10.1007/978-3-642-40084-1_17 fatcat:tylkt7dnezaahcojhwdeq3rjaa

Linearly homomorphic structure-preserving signatures and their applications

Benoît Libert, Thomas Peters, Marc Joye, Moti Yung
2015 Designs, Codes and Cryptography  
data (i.e., combining secure computation and authenticated computation to allow reliable and secure cloud storage and computation, while freeing the client from retaining cleartext storage).  ...  Then, we give a generic construction of non-malleable (and actually simulation-sound) commitment from any linearly homomorphic SPS.  ...  Acknowledgments The authors thank Dario Catalano for his comments and for pointing a necessary correction in the proof of Lemma 1.  ... 
doi:10.1007/s10623-015-0079-1 fatcat:ewmdi6swcnftfcf6acissydhq4

The Fourier Theory of Vision

Gerald Westheimer
2001 Perception  
Non-classical surround zones with complex interacting properties would not be revealed because they are covered by the single overall grating pattern.  ...  Fourier arguments in vision that deal only with power spectra fall short of this goal because an image cannot be fully reconstructed from the power, ie the square of the amplitude, in the Fourier spectrum  ... 
doi:10.1068/p3193 pmid:11430239 fatcat:zh4x6fl7xnatjnlcdcw2yjsk34

Fitting the integrated spectral energy distributions of galaxies

Jakob Walcher, Brent Groves, Tamás Budavári, Daniel Dale
2010 Astrophysics and Space Science  
The present review will be made available on an interactive, moderated web page (sedfitting.org), where the community can access and change the text.  ...  Model predictions and fitting procedures have improved significantly over this time, attempting to keep up with the vastly increased volume and quality of available data.  ...  We would like to thank the participants in the workshop for their motivation and for sharing their expertise, without which this review could not have been written.  ... 
doi:10.1007/s10509-010-0458-z fatcat:h7go2rphlrejfns74seur3hd3a
« Previous Showing results 1 — 15 out of 6,258 results