نتایج جستجو برای: abe

تعداد نتایج: 1907  

Journal: :Actas dermo-sifiliograficas 2014
A Plana Pla I Bielsa Marsol M Fernández-Figueras C Ferrándiz Foraster

1. Kanitakis J, Lora V. Pagetoid dyskeratosis: A frequent pitfall in dermatopathology. Eur J Dermatol. 2010;20:123--4. 2. Toyonaga E, Inokuma D, Abe Y, Abe R, Shimizu H. Pagetoid dyskeratosis with parallel ridge pattern under dermoscopy. JAMA Dermatol. 2013;149:109--11. 3. Frenk E, Delacrétraz J. Hydropic degeneration of epidermal keratinocytes. An alteration leading to patchy hyperpigmentation...

2012
Seiko Arita

In this paper, we propose a notion of flexible attribute-based encryption. Flexible attribute-based encryption is a variant of ciphertextpolicy ABE, which allows one to loosen a decryption policy underlying a given ciphertext, if one knows some system-wide trapdoor information, without knowing its underlying plaintext message. We give a concrete construction of the flexible attribute-based encr...

2000
Lori S. Levin Boris Bartlog Ariadna Font Llitjós Donna Gates Alon Lavie Dorcas Wallace Taro Watanabe Monika Woszczyna

For several years we have been conducting Accuracy Based Evaluations (ABE) of the JANUS speech-to-speech MT system (Gates et al., 1997) which measure quality and fidelity of translation. Recently we have begun to design a Task Based Evaluation for JANUS (Thomas, 1999) which measures goal completion. This paper describes what we have learned by comparing the two types of evaluation. Both evaluat...

Journal: :IACR Cryptology ePrint Archive 2012
Sanjam Garg Craig Gentry Shai Halevi Amit Sahai Brent Waters

In this work, we provide the first construction of Attribute-Based Encryption (ABE) for general circuits. Our construction is based on the existence of multilinear maps. We prove selective security of our scheme in the standard model under the natural multilinear generalization of the BDDH assumption. Our scheme achieves both Key-Policy and Ciphertext-Policy variants of ABE. Our scheme and its ...

Journal: :JSW 2014
Yi-mu Ji Jie Tan Hai Liu Yan-peng Sun Jia-bang Kang Zizhuo Kuang Chuanxin Zhao

Most of the existing ways for strengthening users’ confidence in uploading private data to a cloud platform stress too much on security. On the contrary, cloud computing must be open and distributed. Moreover, it should provide highly robust, secure, and quality services to users. Therefore, establishing a balance between the performance and the security of cloud platforms is necessary. In this...

2011
Laura Laaksonen Ville Myllylä Riitta Niemistö

This paper describes an artificial bandwidth extension (ABE) method that generates new high frequency components to a narrowband signal by folding specifically gained subbands to frequencies from 4 kHz to 7 kHz, and improves the quality and intelligibility of narrowband speech in mobile devices. The proposed algorithm was evaluated by subjective listening tests. In addition, rarely used convers...

2013
Sharon L. Reynolds Jerry D. Johnson James A. Salzman

The extant literature offers little to describe the processes for screening students in adult basic education (ABE) programs for potential learning disabilities, referring adult students for diagnostic assessment, or barriers to obtaining diagnostic assessment for a learning disability. Without current documentation of a learning disability, ABE students are excluded from obtaining accommodatio...

Journal: :Journal of Systems and Software 2017
Rui Zhang Hui Ma Yao Lu

Attribute-based encryption (ABE) has potential to be applied in cloud computing applications to provide fine-grained access control over encrypted data. However, the computation cost of ABE is considerably expensive, because the pairing and exponentiation operations grow with the complexity of access formula. In this work, we propose a fully outsourced ciphertextpolicy ABE scheme that for the f...

2003
Xiaofeng Chen Byoungcheon Lee Kwangjo Kim

Bid-rigging is a dangerous attack in electronic auction. Abe and Suzuki firstly introduced the idea of receipt-free to prevent this attack. In this paper we point out that Abe and Suzuki’s scheme only provides receipt-freeness for losing bidders. We argue that it is more important to provide receipt-freeness for winners and propose a new receipt-free sealed bid auction scheme using the homomorp...

2012
Nelly Fazio Irippuge Milinda Perera

Motivation & State-of-the-Art Cryptographic tools for securing multicast communications: Broadcast Encryption (BE): transmit data to a dynamically changing set of recipients o Info about receivers is broadcast in the clear Receivers’ identities often sensitive. Secure communication ought to protect more than just transmitted content! Anonymous BE (ABE) [BBW06]: also hides receiver set Current b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید