Sciweavers

56 search results - page 9 / 12
» Cryptographic properties of nonlinear pseudorandom number ge...
Sort
View
ISW
2001
Springer
15 years 4 months ago
An Auditable Metering Scheme for Web Advertisement Applications
This paper proposes a cryptographic mechanism for metering the duration and/or the number of instances of running a data process. This mechanism has the following property: knowing...
Liqun Chen, Wenbo Mao
AUTOMATICA
2007
61views more  AUTOMATICA 2007»
15 years 1 days ago
Simultaneous stabilization of a set of nonlinear port-controlled Hamiltonian systems
This paper investigates simultaneous stabilization of a set of nonlinear port-controlled Hamiltonian (PCH) systems and proposes a number of results on the design of simultaneous s...
Yuzhen Wang, Gang Feng, Daizhan Cheng
ICS
2010
Tsinghua U.
15 years 9 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
ACISP
2001
Springer
15 years 4 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 1 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny