![Secure Signature Protocol (Report)](/assets/artwork/1x1-42817eea7ade52607a760cbee00d1495.gif)
![Secure Signature Protocol (Report)](/assets/artwork/1x1-42817eea7ade52607a760cbee00d1495.gif)
![](/assets/artwork/1x1-42817eea7ade52607a760cbee00d1495.gif)
![](/assets/artwork/1x1-42817eea7ade52607a760cbee00d1495.gif)
Secure Signature Protocol (Report)
Intelligent Information Management 2009, Dec, 1, 3
-
- 2,99 €
-
- 2,99 €
Description de l’éditeur
1. Introduction Feigenbaum proposes the following problem [1]: Alice has a function f() and a its instance x. She needs to compute f(x), but does not have the corresponding computing resources, or because she is too lazy to do the computing. The sources here are in general sense which includes the computing time, algorithmic knowledge or corresponding hardware. If Bob has the corresponding resources, can she take advantage of Bob's resources without trust him? That is, can she use Bob's resources to compute f(x) without letting Bob know x and f(x)?
Plus de livres similaires
Plus de livres par Intelligent Information Management
Literature Review of Single Machine Scheduling Problem with Uniform Parallel Machines (Report)
2010
How to Make Highly Rational Use of Modern Educational Technologies (Report)
2010
Simulated Annealing Algorithm to Minimize Makespan in Single Machine Scheduling Problem with Uniform Parallel Machines (Report)
2011
Data Mining Technology Across Academic Disciplines (Report)
2011
Design and Implementation of the Image Interactive System Based on Human-Computer Interaction (Report)
2010
Design and Comparison of Simulated Annealing Algorithm and GRASP to Minimize Makespan in Single Machine Scheduling with Unrelated Parallel Machines.
2010