Sciweavers

978 search results - page 38 / 196
» Knowledge, Probability, and Adversaries
Sort
View
EUROCRYPT
2007
Springer
15 years 4 months ago
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Abstract. Multiparty signature protocols need protection against roguekey attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, p...
Thomas Ristenpart, Scott Yilek
VLDB
2007
ACM
138views Database» more  VLDB 2007»
15 years 3 months ago
Minimality Attack in Privacy Preserving Data Publishing
Data publishing generates much concern over the protection of individual privacy. In the well-known kanonymity model and the related models such as l-diversity and (α, k)-anonymi...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, J...
ESORICS
2009
Springer
15 years 4 months ago
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Ko...
ILP
2007
Springer
15 years 3 months ago
Learning to Assign Degrees of Belief in Relational Domains
A recurrent question in the design of intelligent agents is how to assign degrees of beliefs, or subjective probabilities, to various events in a relational environment. In the sta...
Frédéric Koriche
KDD
1995
ACM
182views Data Mining» more  KDD 1995»
15 years 1 months ago
Accelerated Quantification of Bayesian Networks with Incomplete Data
Probabilistic expert systemsbased on Bayesian networks(BNs)require initial specification both a qualitative graphical structure and quantitative assessmentof conditional probabili...
Bo Thiesson