نتایج جستجو برای: such as homomorphic deconvolution

تعداد نتایج: 5967123  

Journal: :CoRR 2015
Youssef Gahi Mouhcine Guennoun Khalil El-Khatib

Cloud computing emerges as an attractive solution that can be delegated to store and process confidential data. However, several security risks are encountered with such a system as the securely encrypted data should be decrypted before processing them. Therefore, the decrypted data is susceptible to reading and alterations. As a result, processing encrypted data has been a research subject sin...

Journal: :Medical image analysis 2008
Khaled Khairy Jonathon Howard

Numerical deconvolution of 3D fluorescence microscopy data yields sharper images by reversing the known optical aberrations introduced during the acquisition process. When additional prior information such as the topology and smoothness of the imaged object surface is available, the deconvolution can be performed by fitting a parametric surface directly to the image data. In this work, we incor...

2011
George Danezis Benjamin Livshits

Privacy is considered one of the key challenges when moving services to the Cloud. Solution like access control are brittle, while fully homomorphic encryption that is hailed as the silver bullet for this problem is far from practical. But would fully homomorphic encryption really be such an effective solution to the privacy problem? And can we already deploy architectures with similar security...

Journal: :IACR Cryptology ePrint Archive 2013
Gérald Gavin

We propose a general framework to develop fully homomorphic encryption schemes (FHE) without using the Gentry’s technique. Initially, a private-key cryptosystem is built over Zn (n being an RSA modulus). An encryption of x ∈ Zn is a randomly chosen vector e such that Φ(e) = x where Φ is a secret multivariate polynomial. This private-key cryptosystem is not homomorphic in the sense that the vect...

2013
Michael Clear Arthur Hughes Hitesh Tewari

A characterization of predicate encryption (PE) with support for homomorphic operations is presented and we describe the homomorphic properties of some existing PE constructions. Even for the special case of IBE, there are few known group-homomorphic cryptosystems. Our main construction is an XOR-homomorphic IBE scheme based on the quadratic residuosity problem (variant of the Cocks’ scheme), w...

2017
Hao Chen Kim Laine Rachel Player

Traditional encryption schemes, both symmetric and asymmetric, were not designed to respect the algebraic structure of the plaintext and ciphertext spaces. Many schemes, such as ElGamal (resp. e.g. Paillier), are multiplicatively homomorphic (resp. additively homomorphic), and can be used to perform limited types of computations directly on the encrypted data and have them pass through the encr...

2013
Ciara Moore Neil Hanley John McAllister Máire O'Neill Elizabeth O'Sullivan Xiaolin Cao

Homomorphic encryption offers potential for secure cloud computing. However due to the complexity of homomorphic encryption schemes, performance of implemented schemes to date have been unpractical. This work investigates the use of hardware, specifically Field Programmable Gate Array (FPGA) technology, for implementing the building blocks involved in somewhat and fully homomorphic encryption s...

this thesis attempts to investigate the effects of prelistening activities on enhancing iranian efl learners` listening comprehension. the present study investigated ways in which learners` background knowledge could be activated in order to enhance their l2 listening comprehension by limiting the number of possible text interpretations prior to listening. the experiments conducted in this study examined the effect of prior knowledge and vocabulary teaching on iranian efl learners listening comprehension. the current study has two purposes: one is to investigate the effect of background knowledge on the second language listening comprehension of iranian intermediates and the other is to determine whether second language is facilitated by the introduction of unknown vocabularies in the form of prelistening activities. to conduct the study different instruments such as listening proficiency test and four listening tests such as pre and posttests were used and various statistical processes and techniques including paired-sample t-test, and analysis of variance (anova) were used. the findings of this study supported all three hypotheses tested. differences were found between the means of preteaching vocabulary variable, the background knowledge activation variable, and mean difference between these two strategies variable. subjects scored higher when the unknown words were taught in advance. likewise, subjects scored higher when they were asked some relevant questions about the topic than on those without them. there was, in addition, a significant difference between the means of preteaching vocabulary strategy and background knowledge activation strategy. in fact, preteaching vocabulary had a better effect in enhancing the students’ listening comprehension, in comparison to background knowledge activation strategy.

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1390

this thesis attempts to investigate the effects of prelistening activities on enhancing iranian efl learners` listening comprehension. the present study investigated ways in which learners` background knowledge could be activated in order to enhance their l2 listening comprehension by limiting the number of possible text interpretations prior to listening. the experiments conducted in this stud...

2015
Angel Yu Wai Lok Lai James Payor

Homomorphic Encryption yields deliberately malleable ciphertext, allowing operations on encrypted data. We outline and implement a homomorphic encryption scheme as suggested by Zhou and Wornell [1] that encrypts integer vectors to allow computation of arbitrary polynomials in the encrypted domain with a bounded degree. This finds applications particularly in cloud computation, when one is inter...

2005
Charles J. Ammon

We describe and apply an iterative, t ime-domain deconvolution approach to receiver-function estimation and illustrate the reliability and advantages of the technique using syntheticand observation-based examples. The iterative technique is commonly used in earthquake t ime-function studies and offers several advantages in receiver-function analysis such as intuitively stripping the largest rec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید