Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Peter Lory"'
Autor:
Peter Lory
Publikováno v:
IMA Journal of Management Mathematics. 10:117-126
Increasing competition in the process industries enforces the application of mathematical simulation techniques both in the design phase and in the operating phase of a plant. The basic apparatus for separation processes is the distillation column. I
Autor:
Peter Lory
Publikováno v:
Nonlinear Analysis: Theory, Methods & Applications. 30:4965-4972
Autor:
Manuel Liedel, Peter Lory
Publikováno v:
Information Security and Privacy ISBN: 9783642314476
ACISP
ACISP
Lindell and Pinkas (2002) have proposed the idea of using the techniques of secure multi-party computations to generate efficient algorithms for privacy preserving data-mining. In this context Kiltz, Leander, and Malone-Lee (2005) have presented a pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::97a507e003ca6e16f942076479060fbe
https://doi.org/10.1007/978-3-642-31448-3_5
https://doi.org/10.1007/978-3-642-31448-3_5
Autor:
Peter Lory
Publikováno v:
Privacy in Statistical Databases ISBN: 9783642336263
Privacy in Statistical Databases
Privacy in Statistical Databases
This paper considers a scenario where two parties having private databases wish to cooperate by computing a data mining algorithm on the union of their databases without revealing any unnecessary information. In particular, they want to apply the dec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::61058eab7026ab080f42542d4abc4c8b
https://doi.org/10.1007/978-3-642-33627-0_25
https://doi.org/10.1007/978-3-642-33627-0_25
Publikováno v:
E-Business and Telecommunications ISBN: 9783642357541
ICETE (Selected Papers)
ICETE (Selected Papers)
Wireless sensor networks consist of a huge number of small nodes, communicating wirelessly, to transmit any sort of measured data, like temperature, radiation, etc. At the air interface, unprotected messages can be easily intercepted and modified by
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::97fff8ce77c4a2f60a8d0f9230ba6d87
https://doi.org/10.1007/978-3-642-35755-8_6
https://doi.org/10.1007/978-3-642-35755-8_6
Autor:
Peter Lory
Publikováno v:
HICSS
Cryptographic workflows are a concept with a high potential for electronic government. It has been developed in the literature on identity based cryptography. It allows a government as the issuer of an electronic document to enforce the recipient to
Autor:
Peter Lory
Publikováno v:
Applied Mathematics Letters. 6:83-87
Realistic and comprehensive mathematical models of the renal concentrating mechanism lead to large Systems of nonlinear differential equations. Their complexity can be considerably reduced by combining like tubules into common structures. Then the di
Autor:
Peter Lory
Publikováno v:
SECURWARE
In view of practical applications, it is a high priority to optimize the efficiency of methods for secure multiparty computations. These techniques enable, for instance, truly practical double auctions and distributed signatures. The multiplication p
Autor:
Peter Lory
Publikováno v:
Information Security and Privacy ISBN: 9783642026195
ACISP
ACISP
Catalano, Gennaro and Halevi (2000) present a protocol for the distributed computation of inverses over a shared secret modulus. The most important application of their protocol is the distributed computation of the private RSA key from the public ke
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d545207f90096cb6cf46782e41b8537e
https://doi.org/10.1007/978-3-642-02620-1_18
https://doi.org/10.1007/978-3-642-02620-1_18
Autor:
Peter Lory
Publikováno v:
From Nano to Space ISBN: 9783540742371
In the light of information security it is highly desirable to avoid a “single point of failure” because this would be an attractive target for attackers. Cryptographic protocols for distributed computations are important techniques in pursuing t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c8a9209fba206aa315b4d4a66fdb942c
https://doi.org/10.1007/978-3-540-74238-8_18
https://doi.org/10.1007/978-3-540-74238-8_18