Sciweavers

319 search results - page 10 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
CSDA
2008
102views more  CSDA 2008»
14 years 11 months ago
Step-up and step-down procedures controlling the number and proportion of false positives
In multiple hypotheses testing, it is important to control the probability of rejecting "true" null hypotheses. A standard procedure has been to control the family-wise ...
Paul N. Somerville, Claudia Hemmelmann
CRYPTO
2009
Springer
105views Cryptology» more  CRYPTO 2009»
15 years 5 months ago
Privacy-Enhancing Auctions Using Rational Cryptography
Abstract. We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, ou...
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Tr...
CRYPTO
2010
Springer
151views Cryptology» more  CRYPTO 2010»
15 years 7 days ago
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
Abstract. A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with e...
Yevgeniy Dodis, Krzysztof Pietrzak
MICCAI
2009
Springer
16 years 9 days ago
Inverse C-arm Positioning for Interventional Procedures Using Real-Time Body Part Detection
The automation and speedup of interventional therapy and diagnostic workflows is a crucial issue. One way to improve these workflows is to accelerate the image acquisition procedur...
Christian Schaller, Christopher Rohkohl, Jochen Pe...
ICPR
2010
IEEE
15 years 2 months ago
Extrinsic Camera Parameter Estimation Using Video Images and GPS Considering GPS Positioning Accuracy
Abstract--This paper proposes a method for estimating extrinsic camera parameters using video images and position data acquired by GPS. In conventional methods, the accuracy of the...
Hideyuki Kume, Takafumi Taketomi, Tomokazu Sato, N...