Sciweavers

1018 search results - page 58 / 204
» Generative unbinding of names
Sort
View
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 4 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
DASFAA
2011
IEEE
525views Database» more  DASFAA 2011»
14 years 4 months ago
StreamFitter: A Real Time Linear Regression Analysis System for Continuous Data Streams
In this demo, we present the StreamFitter system for real-time regression analysis on continuous data streams. In order to perform regression on data streams, it is necessary to co...
Chandima H. Nadungodage, Yuni Xia, Fang Li, Jaehwa...
NPL
2011
14 years 3 months ago
A Neural Network Scheme for Long-Term Forecasting of Chaotic Time Series
The accuracy of a model to forecast a time series diminishes as the prediction horizon increases, in particular when the prediction is carried out recursively. Such decay is faster...
Pilar Gómez-Gil, Juan Manuel Ramírez...
115
Voted
IACR
2011
94views more  IACR 2011»
14 years 7 days ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
125
Voted
CVPR
2012
IEEE
13 years 3 months ago
Meta-class features for large-scale object categorization on a budget
In this paper we introduce a novel image descriptor enabling accurate object categorization even with linear models. Akin to the popular attribute descriptors, our feature vector ...
Alessandro Bergamo, Lorenzo Torresani