A secret sharing scheme allows a dealer to distribute a secret with a set of parties, such that only a certain subset of parties can collaborate and learn the shared secret. Traditional secret sharing schemes have been used as building blocks in various subdomains of cryptography. Recently, two new extensions...
One of the pervasive problems arising in our modern, digital world surrounds data breaches where an adversary, through zero-day exploitations, phishing, or old-fashioned social engineering attacks, gains access to a service’s data stores. Our society increasingly relies on these cloud-based services for everything from our taxes to personal communication. As...
Private matching (PM) is a key cryptographic primitive in secure computation that allows several parties to jointly compute some functions depending on their private inputs. Indeed, this primitive has many practical applications. For instance, in online advertising, two companies may wish to find their common customers for a joint marketing...
The effect of planting density and nitrogen (N) fertilization on growth, yield, and N partitioning in young and mature 'Bluecrop' blueberry plants was studied over a two year period. Depleted 15N-ammonium sulfate was applied at different rates and on different dates in a mature planting, and at different rates in...
Drought and mandatory water restrictions are limiting the availability of irrigation water in many important blueberry growing regions and new strategies are needed to maintain yield and fruit quality with less water. Three potential options for reducing water use, including deficit irrigation, irrigation cut-offs, and crop thinning, were evaluated for...
The high productivity of Eastern Boundary Upwelling Ecosystems (EBUE), some of the most productive ecosystems in the globe, is attributed to the nutrient rich waters brought up through upwelling. Climate change scenarios for coastal upwelling systems, predict an intensification of coastal upwelling winds. Associated with intensification in upwelling are biogeochemical...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...
I have participated in a drug discovery program designed to screen marine algae for
inhibitors of cancer-related enzymes, antitumor compounds, antiinflammatory substances,
and other agents of potential pharmaceutical utility. Over 1,500 lipid and aqueous extracts
of marine plants and animals were surveyed for biomedical potential. Assays designed to
screen extracts...