Sciweavers

2735 search results - page 139 / 547
» Comparing notions of randomness
Sort
View
COMCOM
2008
126views more  COMCOM 2008»
13 years 10 months ago
Hi3: An efficient and secure networking architecture for mobile hosts
The Host Identity Indirection Infrastructure (Hi3) is a networking architecture for mobile hosts, derived from the Internet Indirection Infrastructure (i3) and the Host Identity P...
Andrei Gurtov, Dmitry Korzun, Andrey Lukyanenko, P...
ESORICS
2009
Springer
14 years 11 months ago
Type-Based Analysis of PIN Processing APIs
We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We s...
Matteo Centenaro, Riccardo Focardi, Flaminia L. Lu...
TCC
2009
Springer
112views Cryptology» more  TCC 2009»
14 years 10 months ago
Non-malleable Obfuscation
Existing definitions of program obfuscation do not rule out malleability attacks, where an adversary that sees an obfuscated program is able to generate another (potentially obfus...
Ran Canetti, Mayank Varia
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
14 years 10 months ago
Privacy Preserving OLAP
We present techniques for privacy-preserving computation of multidimensional aggregates on data partitioned across multiple clients. Data from different clients is perturbed (rand...
Rakesh Agrawal, Ramakrishnan Srikant, Dilys Thomas
ISBRA
2009
Springer
14 years 5 months ago
Integrating Multiple-Platform Expression Data through Gene Set Features
Abstract. We demonstrate a set-level approach to the integration of multiple platform gene expression data for predictive classification and show its utility for boosting classi...
Matej Holec, Filip Zelezný, Jirí Kl&...