نتایج جستجو برای: secure sets

تعداد نتایج: 266654  

Journal: :J. Mathematical Cryptology 2015
Chris Dowden

We investigate the problem of secure message transmission in the presence of a ‘fully generalised’ adversary, who disrupts and listens to separate sets of communication wires. We extend previous results by considering the case when these sets may have arbitrary size, providing necessary and sufficient conditions for both one-way and two-way communication.

2005
Manuel Oriol Michael W. Hicks

A simple and effective way of coordinating distributed, mobile, and parallel applications is to use a virtual shared memory (VSM), such as a Linda tuple-space. In this paper, we propose a new kind of VSM, called a tagged set. Each element in the VSM is a value with an associated tag, and values are read or removed from the VSM by matching the tag. Tagged sets exhibit three properties useful for...

Journal: :Proceedings on Privacy Enhancing Technologies 2021

Abstract We design and implement an efficient, secure, homomorphic k-Nearest Neighbours determination algorithm, to be used for regression or classification over private data. Our algorithm runs in quadratic complexity with regard the size of database but is only one literature make secure completely non-interactively. show that our both efficient accurate when applied problems requiring a smal...

1997
Martin Hirt Ueli Maurer

The classical results in unconditional multi-party computation among a set of n players state that less than n=2 passive or less than n=3 active adversaries can be tolerated; assuming a broadcast channel the threshold for active adversaries is n=2. Strictly generalizing these results we specify the set of potentially misbehaving players as an arbitrary set of subsets of the player set. We prove...

Journal: :iranian journal of fuzzy systems 2011
naim cagman serdar enginoglu filiz citak

in this work, we define a fuzzy soft set theory and its related properties. we then define fuzzy soft aggregation operator that allows constructing more efficient decision making method. finally, we give an example which shows that the method can be successfully applied to many problems that contain uncertainties.

Journal: :Fuzzy Sets and Systems 2002
Nehad N. Morsi Aly A. Fahmy

We consider a multiple-rule, generalized modus ponens inference scheme, with an interpretation based on compositional rule of inference (CRI) and a residuated implication. We show that such a system is equivalent, as far as CRI is concerned, to a system that satis5es the “basic requirement for fuzzy reasoning”, proposed by Turksen and Tian (Fuzzy Sets and Systems 58 (1993) 3–40). We establish a...

Journal: :Fuzzy Sets and Systems 2011
Zsófia Lendek Jimmy Lauber Thierry-Marie Guerra Robert Babuska Bart De Schutter

The description of the error dynamics (30) in our paper [1] contains an omission that leads to some bounds used in the conditions of Theorem 8 and Corollary 2 in the paper to be incorrectly defined. In what follows, the correct error dynamics and the corresponding conditions are given. Instead of (30) in [1], the error dynamics are actually given by ė = m ∑ i=1 wi(z)[(Ai − LiC +MiAδi)e +Mi(Āδix̂...

Journal: :Journal of Computing Science and Engineering 2011

Journal: :IACR Cryptology ePrint Archive 2016
Mikkel Lambæk

A private set intersection protocol consists of two parties, a Sender and a Receiver, each with a secret input set. The protocol aims to have the Receiver output an intersection of the two sets while keeping the elements in the sets secret. This thesis thoroughly analyzes four recently published set intersection protocols, where it explains each protocol and checks whether it satisfies its corr...

Journal: :Theor. Comput. Sci. 2016
Ismael González Yero Marko Jakovac Dorota Kuziak

The concepts of secure sets and security number in graphs were introduced first by Brigham et al. in 2007 as a generalization of the concept of alliances in graphs. Defensive alliances are related to the defense of a single vertex. But, in a general realistic settings, alliances should be formed so that any attack on the entire alliance or any subset of the alliance can be defended. In this sen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید