Sciweavers

76665 search results - page 15272 / 15333
» A proposed
Sort
View
ASIACRYPT
2011
Springer
13 years 11 months ago
Functional Encryption for Inner Product Predicates from Learning with Errors
We propose a lattice-based functional encryption scheme for inner product predicates whose security follows from the difficulty of the learning with errors (LWE) problem. This co...
Shweta Agrawal, David Mandell Freeman, Vinod Vaiku...
ASIACRYPT
2011
Springer
13 years 11 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust
ASUNAM
2011
IEEE
13 years 11 months ago
Co-author Relationship Prediction in Heterogeneous Bibliographic Networks
—The problem of predicting links or interactions between objects in a network, is an important task in network analysis. Along this line, link prediction between co-authors in a ...
Yizhou Sun, Rick Barber, Manish Gupta, Charu C. Ag...
ASUNAM
2011
IEEE
13 years 11 months ago
MultiAspectForensics: Pattern Mining on Large-Scale Heterogeneous Networks with Tensor Analysis
—Modern applications such as web knowledge base, network traffic monitoring and online social networks have made available an unprecedented amount of network data with rich type...
Koji Maruhashi, Fan Guo, Christos Faloutsos
ATAL
2011
Springer
13 years 11 months ago
Reasoning about local properties in modal logic
In modal logic, when adding a syntactic property to an axiomatisation, this property will semantically become true in all models, in all situations, under all circumstances. For i...
Hans P. van Ditmarsch, Wiebe van der Hoek, Barteld...
« Prev « First page 15272 / 15333 Last » Next »