نتایج جستجو برای: shafi

تعداد نتایج: 150  

Journal: :Journal of obstetrics and gynaecology of India 2012
Deeba Shafi A V Sathe

Mrs XYZ, a 30-year-old woman, came with complaints of three and half months of amenorrhea. She was G2P1L1 with a previous LSCS done for cephalo pelvic disproportion (CPD). She had presented with symptoms of fatigue, malaise, weakness, and anemia and was referred to a hematologist in 1985. Her hemoglobin was 8 g %, Hematocrit 25 %, total count 75,000, Lymphoblast 88 %, and Platelet 1.6 lacs. Her...

2009
Vinod Vaikuntanathan

In this thesis, we design randomized algorithms for classical problems in faulttolerant distributed computing in the full-information model. The full-information model is a strong adversarial model which imposes no restrictions on the computational power of the faulty players nor on the information available to them. Namely, the faulty players are infinitely powerful and are privy to all the co...

2018
Shafi Goldwasser Rafail Ostrovsky Alessandra Scafuro Adam Sealfon

We introduce a new coordination problem in distributed computing that we call the population stability problem. A system of agents each with limited memory and communication, as well as the ability to replicate and self-destruct, is subjected to attacks by a worst-case adversary that can at a bounded rate (1) delete agents chosen arbitrarily and (2) insert additional agents with arbitrary initi...

Journal: :IACR Cryptology ePrint Archive 2014
Nishanth Chandran Wutichai Chongchitmate Juan A. Garay Shafi Goldwasser Rafail Ostrovsky Vassilis Zikas

Secure multi-party computation (MPC) has been thoroughly studied over the past decades. The vast majority of works assume a full communication pattern: every party exchanges messages with all the network participants over a complete network of point-to-point channels. This can be problematic in modern large scale networks, where the number of parties can be of the order of millions, as for exam...

2011
AAS Majumder

Background: The association between conduction disturbances and atherosclerotic coronary artery disease has been investigated in a few small studies in the early 1970s and the study result was inconclusive. Thereafter some investigators found in their separate study that a group of patients with conduction disturbances that required permanent pacemaker who had coronary atherosclerotic disease t...

2001
Arthur C. Smith

A threshold signature or decryption scheme is a distributed implementation of a cryptosystem, in which the secret key is secret-shared among a group of servers. These servers can then sign or decrypt messages by following a distributed protocol. The goal of a threshold scheme is to protect the secret key in a highly fault-tolerant way. Namely, the key remains secret, and correct signatures or d...

2008
Adi Akavia Shafi Goldwasser Vinod Vaikuntanathan

This paper considers two questions in cryptography. 1. Simultaneous Hardcore Bits. Let f be a one-way function. We say that a block of bits of x are simultaneously hard-core for f(x) if given f(x), they cannot be distinguished from a random string of the same length. Although there are many examples of (candidate) one-way functions with one hardcore bit (or even O(log n) simultaneously hardcore...

2008
Yael Gertner

In this thesis we introduce and solve three privacy problems in Secure Database Access protocols: Database Privacy, the Data Replication Problem, and the Secure user Identity problem. Database Privacy is concerned with keeping the databases information secure from the user. The Data Replication problem (DRP) deals with a new security concern for databases that emanates from the need to replicat...

2012
Rachel A. Miller

Acknowledgments This thesis is based on joint work with Professor Mihir Bellare and David Cash. I'd like to express gratitude for the time that we explored ideas together; you were wonderful to work with! A very special thank you to my Advisor, Professor Shafi Goldwasser, for such caring mentorship – it has been such a pleasure to work and to learn under you for my time at MIT. Finally, I'd lik...

2010
Zvika Brakerski Shafi Goldwasser

The main results of this work are new public-key encryption schemes that, under the quadratic residuosity (QR) assumption (or Paillier’s decisional composite residuosity (DCR) assumption), achieve key-dependent message security as well as high resilience to secret key leakage and high resilience to the presence of auxiliary input information. In particular, under what we call the subgroup indis...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید