Sciweavers

202 search results - page 31 / 41
» Composing and decomposing systems under security properties
Sort
View
NECO
2008
129views more  NECO 2008»
13 years 8 months ago
Sparse Coding via Thresholding and Local Competition in Neural Circuits
While evidence indicates that neural systems may be employing sparse approximations to represent sensed stimuli, the mechanisms underlying this ability are not understood. We desc...
Christopher J. Rozell, Don H. Johnson, Richard G. ...
ACCV
2009
Springer
14 years 3 months ago
Weighted Map for Reflectance and Shading Separation Using a Single Image
In real world, a scene is composed by many characteristics. Intrinsic images represent these characteristics by two components, reflectance (the albedo of each point) and shading (...
Sung-Hsien Hsieh, Chih-Wei Fang, Te-Hsun Wang, Chi...
CCS
2008
ACM
13 years 10 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
INFOCOM
2009
IEEE
14 years 3 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem