Skip to main content

and
Your search also matched 76 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Research and Application of Non-flowback Clean Fracturing Fluid in Changqing Ultra-Low Permeability Oilfield

Include preview-only content
  1. Chapter and Conference Paper

    Leakage-Resilient Public-Key Encryption from Obfuscation

    The literature on leakage-resilient cryptography contains various leakage models that provide different levels of security. In this work, we consider the bounded leakage and the continual leakage models. In the b...

    Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu in Public-Key Cryptography – PKC 2016 (2016)

  2. Chapter and Conference Paper

    Locally Decodable and Updatable Non-malleable Codes and Their Applications

    Non-malleable codes, introduced as a relaxation of error-correcting codes by Dziembowski, Pietrzak and Wichs (ICS ’10), provide the security guarantee that the message contained in a tampered codeword is eithe...

    Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou in Theory of Cryptography (2015)

  3. Chapter and Conference Paper

    Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware

    Side channel attacks – attacks that exploit implementation-dependent information of a cryptosystem – have been shown to be highly detrimental, and the cryptographic community has recently focused on develo**...

    Dana Dachman-Soled, Feng-Hao Liu in Advances in Cryptology - EUROCRYPT 2015 (2015)

  4. Chapter and Conference Paper

    Multi-Client Verifiable Computation with Stronger Security Guarantees

    At TCC 2013, Choi et al. introduced the notion of multiclient verifiable computation (MVC) in which a set of clients outsource to an untrusted server the computation of a function f over their collective inputs i...

    S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi in Theory of Cryptography (2015)

  5. Chapter and Conference Paper

    Accelerating Parallel Frequent Itemset Mining on Graphics Processors with Sorting

    Frequent Itemset Mining (FIM) is one of the most investigated fields of data mining. The goal of Frequent Itemset Mining (FIM) is to find the most frequently-occurring subsets from the transactions within a da...

    Yuan-Shao Huang, Kun-Ming Yu, Li-Wei Zhou in Network and Parallel Computing (2013)

  6. Chapter and Conference Paper

    2D to 3D Image Conversion Based on Classification of Background Depth Profiles

    In this paper, a 2D to 3D stereo image conversion scheme is proposed for 3D content creation. The difficulty in this problem lies on depth estimation/assignment from a mono image, which actually does not have ...

    Guo-Shiang Lin, Han-Wen Liu, Wei-Chih Chen in Advances in Image and Video Technology (2012)

  7. Chapter and Conference Paper

    Revisiting Fixed Priority Techniques

    Discrete scheduling is preferred over continuous scheduling for preemptive scheduling problems, however, classical continuous schedulability tests can not work effectively with discrete scheduling. This area o...

    Nasro Min-Allah, Wang Yong-Ji, **ng Jian-Sheng in Embedded and Ubiquitous Computing (2007)