This paper studies information-theoretically secure quantum homomorphic
...
A solution of the k shortest paths problem may output paths that are
ide...
This paper demonstrates and proves that the coordination of actions in a...
We consider an extension to the geometric amoebot model that allows amoe...
We suggest using Fully Homomorphic Encryption (FHE) to be used, not only...
The structure and weights of Deep Neural Networks (DNN) typically encode...
The Shortest Path Problem, in real-life applications, has to deal with
m...
We generalize the definition of Proof Labeling Schemes to reactive syste...
In computer networks, participants may cooperate in processing tasks, so...
End-to-end communication over the network layer (or data link in overlay...
Local mutual exclusion guarantees that no two neighboring processes ente...
Peripheral authentication is an important aspect in the vehicle networks...
We study the problem of privately emulating shared memory in message-pas...
Data outsourcing allows data owners to keep their data at untrusted clou...
Hadoop and Spark are widely used distributed processing frameworks for
l...