Sciweavers

317 search results - page 49 / 64
» Practical Key Distribution Schemes for Channel Protection
Sort
View
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
15 years 1 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
72
Voted
ISNN
2007
Springer
15 years 3 months ago
Online Dynamic Value System for Machine Learning
A novel online dynamic value system for machine learning is proposed in this paper. The proposed system has a dual network structure: data processing network (DPN) and information ...
Haibo He, Janusz A. Starzyk
EUROCRYPT
2006
Springer
15 years 1 months ago
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
Abstract. Lattice-based signature schemes following the GoldreichGoldwasser-Halevi (GGH) design have the unusual property that each signature leaks information on the signer's...
Phong Q. Nguyen, Oded Regev
ICT
2004
Springer
127views Communications» more  ICT 2004»
15 years 3 months ago
An Interference Avoidance Technique for Ad Hoc Networks Employing Array Antennas
Array antennas have the potential to increase the capacity of wireless networks, but a distributed beamforming algorithm for maximizing the capacity in asynchronous, decentralized ...
T. Hunziker, Jacir Luiz Bordim, T. Ohira, Shinsuke...
85
Voted
CN
2007
99views more  CN 2007»
14 years 9 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...