Sciweavers

679 search results - page 76 / 136
» Using decision problems in public key cryptography
Sort
View
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
14 years 11 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
DSN
2011
IEEE
14 years 1 months ago
Resource and virtualization costs up in the cloud: Models and design choices
—Virtualization offers the potential for cost-effective service provisioning. For service providers who make significant investments in new virtualized data centers in support of...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova
IJACT
2008
158views more  IJACT 2008»
15 years 1 months ago
Efficient lattice-based signature scheme
: In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece public key cryptosystem, in which security is related to the hardness of approximat...
Thomas Plantard, Willy Susilo, Khin Than Win, Qion...
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
15 years 6 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
WSC
2008
15 years 3 months ago
Application of spatial visualization for probabilistic hurricanes risk assessment to build environment
Hurricanes have caused extensive economic losses and social disruption in the past two decades in the United States. A key component for improving building and infrastructure prac...
Yue Li, Tyler A. Erickson