Sciweavers

123 search results - page 23 / 25
» Multiple Identities in BitTorrent Networks
Sort
View
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 3 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
72
Voted
EUROCRYPT
2004
Springer
15 years 3 months ago
Dining Cryptographers Revisited
Abstract. Dining cryptographers networks (or DC-nets) are a privacypreserving primitive devised by Chaum for anonymous message publication. A very attractive feature of the basic D...
Philippe Golle, Ari Juels
JMM2
2007
221views more  JMM2 2007»
14 years 9 months ago
Automatic Extraction of Femur Contours from Calibrated X-Ray Images using Statistical Information
— Automatic identification and extraction of bone contours from x-ray images is an essential first step task for further medical image analysis. In this paper we propose a 3D s...
Xiao Dong, Miguel Ángel González Bal...
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 1 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...
FOCS
2002
IEEE
15 years 2 months ago
A Constant-Factor Approximation Algorithm for the Multicommodity
We present the first constant-factor approximation algorithm for network design with multiple commodities and economies of scale. We consider the rent-or-buy problem, a type of m...
Amit Kumar, Anupam Gupta, Tim Roughgarden