Sciweavers

1120 search results - page 114 / 224
» Securely sharing neuroimagery
Sort
View
104
Voted
CORR
2008
Springer
138views Education» more  CORR 2008»
15 years 26 days ago
An Improved Robust Fuzzy Extractor
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, W to agree on a secret key R in the presence of an active ...
Bhavana Kanukurthi, Leonid Reyzin
91
Voted
NETWORK
2008
106views more  NETWORK 2008»
15 years 22 days ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford
107
Voted
TDSC
2008
99views more  TDSC 2008»
15 years 20 days ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...
93
Voted
PVLDB
2010
179views more  PVLDB 2010»
14 years 11 months ago
Nearest Neighbor Search with Strong Location Privacy
The tremendous growth of the Internet has significantly reduced the cost of obtaining and sharing information about individuals, raising many concerns about user privacy. Spatial...
Stavros Papadopoulos, Spiridon Bakiras, Dimitris P...
96
Voted
SCN
2010
Springer
147views Communications» more  SCN 2010»
14 years 11 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström