Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Margin-maximizing techniques such as boosting have been generating excitement in machine learning circles for several years now. Although these techniques offer significant impro...
The Internet has emerged as a crucial part of the Global Information Infrastructure. This is not least due to the remarkable longevity and versatility of some of its protocols. Ac...