Sciweavers

4511 search results - page 576 / 903
» Observation Based System Security
Sort
View
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
15 years 8 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
113
Voted
PRIMA
2007
Springer
15 years 10 months ago
Multiagent Planning with Trembling-Hand Perfect Equilibrium in Multiagent POMDPs
Multiagent Partially Observable Markov Decision Processes are a popular model of multiagent systems with uncertainty. Since the computational cost for finding an optimal joint pol...
Yuichi Yabu, Makoto Yokoo, Atsushi Iwasaki
134
Voted
SBACPAD
2004
IEEE
93views Hardware» more  SBACPAD 2004»
15 years 6 months ago
FlowCert : Probabilistic Certification for Peer-to-Peer Computations
Large scale cluster, Peer-to-Peer computing systems and grid computer systems gather thousands of nodes for computing parallel applications. At this scale, it raises the problem o...
Sébastien Varrette, Jean-Louis Roch, Franck...
122
Voted
SPEECH
2010
125views more  SPEECH 2010»
14 years 11 months ago
Automatic intonation assessment for computer aided language learning
In this paper the nature and relevance of the information provided by intonation is discussed in the framework of second language learning. As a consequence, an automatic intonati...
Juan Pablo Arias, Néstor Becerra Yoma, Hira...
EUROCRYPT
2011
Springer
14 years 8 months ago
Homomorphic Signatures for Polynomial Functions
We construct the first homomorphic signature scheme that is capable of evaluating multivariate polynomials on signed data. Given the public key and a signed data set, there is an...
Dan Boneh, David Mandell Freeman