Sciweavers

349 search results - page 44 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
EUROCRYPT
1999
Springer
14 years 27 days ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
STOC
1994
ACM
168views Algorithms» more  STOC 1994»
14 years 21 days ago
Fast algorithms for finding randomized strategies in game trees
Interactions among agents can be conveniently described by game trees. In order to analyze a game, it is important to derive optimal (or equilibrium) strategies for the di erent p...
Daphne Koller, Nimrod Megiddo, Bernhard von Stenge...
ICALP
2010
Springer
14 years 1 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
CSE
2009
IEEE
13 years 9 months ago
Time Critical Content Delivery Using Predictable Patterns in Mobile Social Networks
In Mobile Social Networks (MSN) individuals with similar interests or commonalities connect to each other using the mobile phones. MSN are special kind of Ad-hoc Networks in which ...
Fawad Nazir, Jianhua Ma, Aruna Seneviratne
ICML
2009
IEEE
14 years 9 months ago
Multi-assignment clustering for Boolean data
Conventional clustering methods typically assume that each data item belongs to a single cluster. This assumption does not hold in general. In order to overcome this limitation, w...
Andreas P. Streich, Mario Frank, David A. Basin, J...