Sciweavers

123 search results - page 23 / 25
» Multiple Identities in BitTorrent Networks
Sort
View
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 5 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
EUROCRYPT
2004
Springer
15 years 5 months ago
Dining Cryptographers Revisited
Abstract. Dining cryptographers networks (or DC-nets) are a privacypreserving primitive devised by Chaum for anonymous message publication. A very attractive feature of the basic D...
Philippe Golle, Ari Juels
106
Voted
JMM2
2007
221views more  JMM2 2007»
14 years 11 months ago
Automatic Extraction of Femur Contours from Calibrated X-Ray Images using Statistical Information
— Automatic identification and extraction of bone contours from x-ray images is an essential first step task for further medical image analysis. In this paper we propose a 3D s...
Xiao Dong, Miguel Ángel González Bal...
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 3 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...
FOCS
2002
IEEE
15 years 4 months ago
A Constant-Factor Approximation Algorithm for the Multicommodity
We present the first constant-factor approximation algorithm for network design with multiple commodities and economies of scale. We consider the rent-or-buy problem, a type of m...
Amit Kumar, Anupam Gupta, Tim Roughgarden