Sciweavers

6907 search results - page 203 / 1382
» Securing distributed adaptation
Sort
View
HPDC
2000
IEEE
15 years 7 months ago
2K: A Distributed Operating System for Dynamic Heterogeneous Environments
The first decades of the new millennium will witness an explosive growth in the number and diversity of networked devices and portals. We foresee high degrees of mobility, hetero...
Fabio Kon, Roy H. Campbell, M. Dennis Mickunas, Kl...
139
Voted
JMLR
2002
140views more  JMLR 2002»
15 years 2 months ago
On Boosting with Polynomially Bounded Distributions
We construct a framework which allows an algorithm to turn the distributions produced by some boosting algorithms into polynomially smooth distributions (w.r.t. the PAC oracle...
Nader H. Bshouty, Dmitry Gavinsky
159
Voted
DCC
2008
IEEE
16 years 2 months ago
Semantic security for the McEliece cryptosystem without random oracles
In this paper, we formally prove that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and ...
Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill M...
CRYPTO
2006
Springer
99views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Scalable Secure Multiparty Computation
We present the first general protocol for secure multiparty computation which is scalable, in the sense that the amortized work per player does not grow, and in some natural settin...
Ivan Damgård, Yuval Ishai
ICDCSW
2005
IEEE
15 years 9 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob