Sciweavers

96 search results - page 17 / 20
» Covert Multi-Party Computation
Sort
View
EUROCRYPT
2003
Springer
14 years 17 days ago
CAPTCHA: Using Hard AI Problems for Security
We introduce captcha, an automated test that humans can pass, but current computer programs can’t pass: any program that has high success over a captcha can be used to solve an u...
Luis von Ahn, Manuel Blum, Nicholas J. Hopper, Joh...
NECO
2007
87views more  NECO 2007»
13 years 6 months ago
Reinforcement Learning State Estimator
cal networks in the learning of abstract and effector-specific representations of motor sequences. Neuroimage. 32, 714-727. (Neuroimage Editor’s Choice Award, 2006) Daw, N. D. Do...
Jun Morimoto, Kenji Doya
CONEXT
2010
ACM
13 years 5 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields
ICDS
2010
IEEE
14 years 2 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
IEEEARES
2009
IEEE
14 years 2 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop