11 resultados para Multi-prover interactive proofs

em University of Southampton, United Kingdom


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This short video is designed to make you think about the safety aspects of working with lasers within laser laboratories. Postgraduates and research fellows work with many different types of lasers in a variety of different experimental conditions. These lasers are often more powerful than those used as an undergraduate and require additional safety practices. The video was demonstrated to the EUNIS 2008 conference Aarhus, Denmark, and was a finalist in the Dorup E-Learning Award.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This resource contains an interactive tutorial slide, a set of multiple choice questions and a poster that Group 11 composed for INFO2009 Assignment 2. The topic area for the resource is Digital Rights Management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A resource that focuses on using interactive multiple choice questions with accompanying scenario videos to enable university students to understand the legal and professional issues surrounding whistleblowing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A flash learning resource that educates users about Web Accessibility.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A mixture of formats is used as a teaching resorce: animated videos, questions, short graphic novel

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An online interactive tutorial

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Presentation slides + mini quiz on the topic of cybercrime.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Short general guide to report writing with drag and drop activities and sequenced (multiple choice) questions

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Speaker(s): Prof. David Evans Organiser: Dr Tim Chown Time: 22/05/2014 10:45-11:45 Location: B53/4025 Abstract Secure multi-party computation enables two (or more) participants to reliably compute a function that depends on both of their inputs, without revealing those inputs to the other party or needing to trust any other party. It could enable two people who meet at a conference to learn who they known in common without revealing any of their other contacts, or allow a pharmaceutical company to determine the correct dosage of a medication based on a patient’s genome without compromising the privacy of the patient. A general solution to this problem has been known since Yao's pioneering work in the 1980s, but only recently has it become conceivable to use this approach in practice. Over the past few years, my research group has worked towards making secure computation practical for real applications. In this talk, I'll provide a brief introduction to secure computation protocols, describe the techniques we have developed to design scalable and efficient protocols, and share some recent results on improving efficiency and how secure computing applications are developed.

Relevância:

20.00% 20.00%

Publicador: