Sciweavers

1230 search results - page 112 / 246
» On Abstraction in Scenarios
Sort
View
95
Voted
PROVSEC
2010
Springer
14 years 10 months ago
Distinguishing Distributions Using Chernoff Information
Abstract. In this paper, we study the soundness amplification by repetition of cryptographic protocols. As a tool, we use the Chernoff Information. We specify the number of attempt...
Thomas Baignères, Pouyan Sepehrdad, Serge V...
ICWS
2009
IEEE
14 years 10 months ago
Web Service Mashup Middleware with Partitioning of XML Pipelines
Traditionally, the composition of Web services to create mashups has been achieved by using an application server as a mediator between a client browser and services. To avoid thi...
Eric Wohlstadter, Peng Li, Brett Cannon
129
Voted
DCC
2011
IEEE
14 years 7 months ago
Accurate estimates of the data complexity and success probability for various cryptanalyses
Abstract Many attacks on encryption schemes rely on statistical considerations using plaintext/ciphertext pairs to find some information on the key. We provide here simple formula...
Céline Blondeau, Benoît Gérard...
JSAC
2011
82views more  JSAC 2011»
14 years 7 months ago
Optimal Cognitive Access of Markovian Channels under Tight Collision Constraints
Abstract—The problem of cognitive access of channels of primary users by a secondary user is considered. The transmissions of primary users are modeled as independent continuous-...
Xin Li, Qianchuan Zhao, Xiaohong Guan, Lang Tong
120
Voted
TIT
2010
112views Education» more  TIT 2010»
14 years 7 months ago
Twice-universal simulation of Markov sources and individual sequences
Abstract-- The problem of universal simulation given a training sequence is studied both in a stochastic setting and for individual sequences. In the stochastic setting, the traini...
Alvaro Martín, Neri Merhav, Gadiel Seroussi...