Sciweavers

3556 search results - page 574 / 712
» Can machine learning be secure
Sort
View
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 5 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
INFOCOM
2012
IEEE
12 years 1 months ago
Location privacy preservation in collaborative spectrum sensing
—Collaborative spectrum sensing has been regarded as a promising approach to enable secondary users to detect primary users by exploiting spatial diversity. In this paper, we con...
Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Ka...
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 5 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
CIA
2007
Springer
14 years 4 months ago
Agent Behavior Alignment: A Mechanism to Overcome Problems in Agent Interactions During Runtime
When two or more agents interacting, their behaviors are not necessarily matching. Automated ways to overcome conicts in the behavior of agents can make the execution of interacti...
Gerben G. Meyer, Nicolae B. Szirbik
ICCBR
2003
Springer
14 years 3 months ago
Case-Based Ranking for Decision Support Systems
Abstract. Very often a planning problem can be formulated as a ranking problem: i.e. to find an order relation over a set of alternatives. The ranking of a finite set of alternat...
Paolo Avesani, Sara Ferrari, Angelo Susi