University of Mons

Displaying 1-2 of 2 results

  • White Papers // Aug 2012

    Must You Know the Code of f to Securely Compute f?

    When Alice and Bob want to securely evaluate a function of their shared inputs, they typically express the function as a (boolean or arithmetic) circuit and then securely evaluate that circuit, gate-by-gate. In other words, a secure protocol for evaluating f is typically obtained in a non-black-box-way from f itself....

    Provided By University of Mons

  • White Papers // Feb 2011

    Evidence for the Pareto Principle in Open Source Software Activity

    Numerous empirical studies analyze evolving Open Source Software (OSS) projects, and try to estimate the activity and effort in these projects. Most of these studies, however, only focus on a limited set of artefacts, being source code and defect data. In the authors' research, they extend the analysis by also...

    Provided By University of Mons

  • White Papers // Aug 2012

    Must You Know the Code of f to Securely Compute f?

    When Alice and Bob want to securely evaluate a function of their shared inputs, they typically express the function as a (boolean or arithmetic) circuit and then securely evaluate that circuit, gate-by-gate. In other words, a secure protocol for evaluating f is typically obtained in a non-black-box-way from f itself....

    Provided By University of Mons

  • White Papers // Feb 2011

    Evidence for the Pareto Principle in Open Source Software Activity

    Numerous empirical studies analyze evolving Open Source Software (OSS) projects, and try to estimate the activity and effort in these projects. Most of these studies, however, only focus on a limited set of artefacts, being source code and defect data. In the authors' research, they extend the analysis by also...

    Provided By University of Mons