Sciweavers

CODCRY
2011
Springer
264views Cryptology» more  CODCRY 2011»
14 years 8 months ago
Algorithms for the Shortest and Closest Lattice Vector Problems
We present the state of the art solvers of the Shortest and Closest Lattice Vector Problems in the Euclidean norm. We recall the three main families of algorithms for these problem...
Guillaume Hanrot, Xavier Pujol, Damien Stehl&eacut...
CODCRY
2011
Springer
247views Cryptology» more  CODCRY 2011»
14 years 8 months ago
List Decoding for Binary Goppa Codes
This paper presents a list-decoding algorithm for classical irreducible binary Goppa codes. The algorithm corrects, in polynomial time, approximately n − p n(n − 2t − 2) err...
Daniel J. Bernstein
CODCRY
2011
Springer
242views Cryptology» more  CODCRY 2011»
14 years 8 months ago
Faster 2-Regular Information-Set Decoding
Fix positive integers B and w. Let C be a linear code over F2 of length Bw. The 2-regular-decoding problem is to find a nonzero codeword consisting of w length-B blocks, each of w...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
CODASPY
2011
14 years 8 months ago
The challenge of data and application security and privacy (DASPY): are we up to it
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confron...
Ravi S. Sandhu
CODASPY
2011
14 years 8 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
CODASPY
2011
14 years 8 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
CNSR
2011
IEEE
257views Communications» more  CNSR 2011»
14 years 8 months ago
On Threshold Selection for Principal Component Based Network Anomaly Detection
—Principal component based anomaly detection has emerged as an important statistical tool for network anomaly detection. It works by projecting summary network information onto a...
Petar Djukic, Biswajit Nandy
CNSR
2011
IEEE
320views Communications» more  CNSR 2011»
14 years 8 months ago
A Structural Analysis of Network Delay
—Network delay is a crucial metric for evaluating the state of the network. We present in this paper a structural analysis of network delay, based on delay measurements of a back...
Atef Abdelkefi, Yuming Jiang
CNSR
2011
IEEE
238views Communications» more  CNSR 2011»
14 years 8 months ago
Measurement Study on PPLive Based on Channel Popularity
Abstract—In recent years, Peer-to-Peer (P2P) streaming systems experienced tremendous growth and became one of the largest bandwidth consumer on Internet. PPLive, one of the most...
Ruixuan Li, Guoqiang Gao, Weijun Xiao, Zhiyong Xu