Sciweavers

113 search results - page 2 / 23
» Correcting errors without leaking partial information
Sort
View
CRYPTO
2008
Springer
150views Cryptology» more  CRYPTO 2008»
13 years 6 months ago
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
ACL
1996
13 years 6 months ago
Combining Trigram-based and Feature-based Methods for Context-Sensitive Spelling Correction
This paper addresses the problem of correcting spelling errors that result in valid, though unintended words (such as peace and piece, or quiet and quite) and also the problem of ...
Andrew R. Golding, Yves Schabes
ISM
2005
IEEE
153views Multimedia» more  ISM 2005»
13 years 10 months ago
Application Layer Error Correction Scheme for Video Header Protection on Wireless Network
In wireless video streaming application, video information may be corrupted by a noisy channel. By introducing error resilience and error concealment techniques, many researchers ...
Chia-Ho Pan, I-Hsien Lee, Sheng-Chieh Huang, Chih-...
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
Correcting Errors in RSA Private Keys
Abstract. Let pk = (N , e) be an RSA public key with corresponding secret key sk = (p, q, d, dp, dq , q-1 p ). Assume that we obtain partial error-free information of sk, e.g., ass...
Wilko Henecka, Alexander May, Alexander Meurer
COLING
2000
13 years 6 months ago
Decision-Tree based Error Correction for Statistical Phrase Break Prediction in Korean
tn this paper, we present a new 1)hrase break prediction architecture that integrates probabilistic apt)roach with decision-tree based error correction. The probabilistic method a...
Byeongchang Kim, Gary Geunbae Lee