Sciweavers

139 search results - page 14 / 28
» Cryptographic Randomized Response Techniques
Sort
View
AIME
2007
Springer
15 years 7 months ago
Variable Selection for Optimal Decision Making
This paper discusses variable selection for medical decision making; in particular decisions regarding when to provide treatment and which treatment to provide. Current variable se...
Lacey Gunter, Ji Zhu, Susan Murphy
ICC
2008
IEEE
106views Communications» more  ICC 2008»
15 years 7 months ago
Lightweight Security for Network Coding
Abstract—Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different dat...
João P. Vilela, Luísa Lima, Jo&atild...
98
Voted
FOSSACS
2008
Springer
15 years 2 months ago
Compositional Methods for Information-Hiding
Protocols for information-hiding often use randomized primitives to obfuscate the link between the observables and the information to be protected. The degree of protection provide...
Christelle Braun, Konstantinos Chatzikokolakis, Ca...
125
Voted
ISCI
2008
160views more  ISCI 2008»
15 years 21 days ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
INFOCOM
2006
IEEE
15 years 6 months ago
Performance of Full Text Search in Structured and Unstructured Peer-to-Peer Systems
— While structured P2P systems (such as DHTs) are often regarded as an improvement over unstructured P2P systems (such as super-peer networks) in terms of routing efficiency, it...
Yong Yang, Rocky Dunlap, Mike Rexroad, Brian F. Co...