Sciweavers

930 search results - page 62 / 186
» A Universal Encryption Standard
Sort
View
ICML
1999
IEEE
14 years 10 months ago
Machine-Learning Applications of Algorithmic Randomness
Most machine learning algorithms share the following drawback: they only output bare predictions but not the con dence in those predictions. In the 1960s algorithmic information t...
Volodya Vovk, Alexander Gammerman, Craig Saunders
SIGUCCS
2000
ACM
14 years 1 months ago
Computer Abuse, Information Technologies and Judicial Affairs
Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Elizabeth Mackenzie, Kathryn Goldman
KDD
2006
ACM
181views Data Mining» more  KDD 2006»
14 years 10 months ago
Cryptographically private support vector machines
We study the problem of private classification using kernel methods. More specifically, we propose private protocols implementing the Kernel Adatron and Kernel Perceptron learning ...
Helger Lipmaa, Sven Laur, Taneli Mielikäinen
IEEEIAS
2008
IEEE
14 years 4 months ago
Dynamic Substitution Model
In this paper, we present the Dynamic Injection Model (DIM) and its variant the Static Injection Model (SIM). DIM is a model that allows any iterative block cipher to accept a var...
Mohamed Abo El-Fotouh, Klaus Diepold
ESORICS
2007
Springer
14 years 4 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia