Sciweavers

14824 search results - page 2793 / 2965
» Security - Introduction
Sort
View
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
13 years 6 months ago
Subspace LWE
The (decisional) learning with errors problem (LWE) asks to distinguish “noisy” inner products of a secret vector with random vectors from uniform. In recent years, the LWE pro...
Krzysztof Pietrzak
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
13 years 1 months ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke
INFOCOM
2012
IEEE
13 years 1 months ago
Phantom: Physical layer cooperation for location privacy protection
—Localization techniques that allow inferring the location of wireless devices directly from received signals have exposed mobile users to new threats. Adversaries can easily col...
Sangho Oh, Tam Vu, Marco Gruteser, Suman Banerjee
INFOCOM
2012
IEEE
13 years 1 months ago
Fine-grained private matching for proximity-based mobile social networking
—Proximity-based mobile social networking (PMSN) refers to the social interaction among physically proximate mobile users directly through the Bluetooth/WiFi interfaces on their ...
Rui Zhang 0007, Yanchao Zhang, Jinyuan Sun, Guanhu...
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
13 years 1 months ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters
« Prev « First page 2793 / 2965 Last » Next »