Sciweavers

319 search results - page 10 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
CSDA
2008
102views more  CSDA 2008»
14 years 9 months ago
Step-up and step-down procedures controlling the number and proportion of false positives
In multiple hypotheses testing, it is important to control the probability of rejecting "true" null hypotheses. A standard procedure has been to control the family-wise ...
Paul N. Somerville, Claudia Hemmelmann
CRYPTO
2009
Springer
105views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Privacy-Enhancing Auctions Using Rational Cryptography
Abstract. We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, ou...
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Tr...
CRYPTO
2010
Springer
151views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
Abstract. A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with e...
Yevgeniy Dodis, Krzysztof Pietrzak
98
Voted
MICCAI
2009
Springer
15 years 10 months ago
Inverse C-arm Positioning for Interventional Procedures Using Real-Time Body Part Detection
The automation and speedup of interventional therapy and diagnostic workflows is a crucial issue. One way to improve these workflows is to accelerate the image acquisition procedur...
Christian Schaller, Christopher Rohkohl, Jochen Pe...
ICPR
2010
IEEE
15 years 28 days ago
Extrinsic Camera Parameter Estimation Using Video Images and GPS Considering GPS Positioning Accuracy
Abstract--This paper proposes a method for estimating extrinsic camera parameters using video images and position data acquired by GPS. In conventional methods, the accuracy of the...
Hideyuki Kume, Takafumi Taketomi, Tomokazu Sato, N...