Sciweavers

1446 search results - page 106 / 290
» Local zero knowledge
Sort
View
IACR
2011
88views more  IACR 2011»
14 years 3 months ago
Targeted Malleability: Homomorphic Encryption for Restricted Computations
We put forward the notion of targeted malleability: given a homomorphic encryption scheme, in various scenarios we would like to restrict the homomorphic computations one can perf...
Dan Boneh, Gil Segev, Brent Waters
118
Voted
IACR
2011
97views more  IACR 2011»
14 years 3 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
IACR
2011
105views more  IACR 2011»
14 years 3 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
131
Voted
ICML
2006
IEEE
16 years 4 months ago
Simpler knowledge-based support vector machines
If appropriately used, prior knowledge can significantly improve the predictive accuracy of learning algorithms or reduce the amount of training data needed. In this paper we intr...
Quoc V. Le, Alex J. Smola, Thomas Gärtner
CVPR
2009
IEEE
16 years 10 months ago
Global Active Contour-based Image Segmentation via Probability Alignment
Active contours is a popular technique for image segmentation. However, active contour tend to converge to the closest local minimum of its energy function and often requires a ...
Andriy Myronenko, Xubo B. Song