Sciweavers

679 search results - page 51 / 136
» Using decision problems in public key cryptography
Sort
View
IJCAI
2003
15 years 2 months ago
ODISET: On-line Distributed Session Tracing using Agents
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Salvador Mandujano, Arturo Galván
TCC
2007
Springer
96views Cryptology» more  TCC 2007»
15 years 7 months ago
Securely Obfuscating Re-encryption
Abstract. We present the first positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to well-known negative impossibil...
Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, V...
PR
2008
79views more  PR 2008»
15 years 1 months ago
Region-based image retrieval with high-level semantics using decision tree learning
Semantic-based image retrieval has attracted great interest in recent years. This paper proposes a region-based image retrieval system with high-level semantic learning. The key f...
Ying Liu, Dengsheng Zhang, Guojun Lu
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 8 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
GLOBECOM
2010
IEEE
14 years 11 months ago
A Graphical Framework for Spectrum Modeling and Decision Making in Cognitive Radio Networks
There are many key problems of decision making related to spectrum occupancies in cognitive radio networks. It is known that there exist correlations of spectrum occupancies in tim...
Husheng Li, Robert C. Qiu