Sciweavers

1256 search results - page 134 / 252
» A Simple E-Voting Protocol
Sort
View
IPMI
2009
Springer
16 years 5 months ago
Active imaging with dual spin-echo diffusion MRI
Abstract. Active imaging is a recently developed approach to modelbased optimisation of imaging protocols. In the application we discuss here, a diffusion magnetic resonance imagin...
Chris A. Clark, Daniel C. Alexander, Jonathan D. C...
ICML
2009
IEEE
16 years 5 months ago
Robust bounds for classification via selective sampling
We introduce a new algorithm for binary classification in the selective sampling protocol. Our algorithm uses Regularized Least Squares (RLS) as base classifier, and for this reas...
Nicolò Cesa-Bianchi, Claudio Gentile, Franc...
WWW
2008
ACM
16 years 5 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
FSE
2009
Springer
136views Cryptology» more  FSE 2009»
16 years 5 months ago
MAC Reforgeability
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
John Black, Martin Cochran
EWSN
2008
Springer
16 years 4 months ago
Resilient Coding Algorithms for Sensor Network Data Persistence
Storing and disseminating coded information instead of the original data can bring significant performance improvements to sensor network protocols. Such methods reduce the risk of...
Daniele Munaretto, Jörg Widmer, Michele Rossi...