Sciweavers

2237 search results - page 80 / 448
» On the Security of Random Sources
Sort
View
136
Voted
DIMVA
2009
15 years 6 months ago
Polymorphing Software by Randomizing Data Structure Layout
Abstract. This paper introduces a new software polymorphism technique that randomizes program data structure layout. This technique will generate different data structure layouts f...
Zhiqiang Lin, Ryan Riley, Dongyan Xu
127
Voted
ESORICS
2003
Springer
15 years 10 months ago
Rapid Mixing and Security of Chaum's Visual Electronic Voting
Recently, David Chaum proposed an electronic voting scheme that combines visual cryptography and digital processing. It was designed to meet not only mathematical security standard...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
160
Voted
AAAI
2010
15 years 6 months ago
Private and Third-Party Randomization in Risk-Sensitive Equilibrium Concepts
We consider risk-sensitive generalizations of Nash and correlated equilibria in noncooperative games. We prove that, except for a class of degenerate games, unless a two-player ga...
Mickey Brautbar, Michael Kearns, Umar Syed
164
Voted
ER
2001
Springer
136views Database» more  ER 2001»
15 years 9 months ago
A Randomized Approach for the Incremental Design of an Evolving Data Warehouse
A Data Warehouse (DW) can be used to integrate data from multiple distributed data sources. A DW can be seen as a set of materialized views that determine its schema and its conten...
Dimitri Theodoratos, Theodore Dalamagas, Alkis Sim...
STOC
2005
ACM
198views Algorithms» more  STOC 2005»
16 years 5 months ago
On lattices, learning with errors, random linear codes, and cryptography
Our main result is a reduction from worst-case lattice problems such as GAPSVP and SIVP to a certain learning problem. This learning problem is a natural extension of the `learnin...
Oded Regev