Sciweavers

139 search results - page 14 / 28
» Cryptographic Randomized Response Techniques
Sort
View
AIME
2007
Springer
14 years 4 months ago
Variable Selection for Optimal Decision Making
This paper discusses variable selection for medical decision making; in particular decisions regarding when to provide treatment and which treatment to provide. Current variable se...
Lacey Gunter, Ji Zhu, Susan Murphy
ICC
2008
IEEE
106views Communications» more  ICC 2008»
14 years 4 months ago
Lightweight Security for Network Coding
Abstract—Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different dat...
João P. Vilela, Luísa Lima, Jo&atild...
FOSSACS
2008
Springer
13 years 11 months ago
Compositional Methods for Information-Hiding
Protocols for information-hiding often use randomized primitives to obfuscate the link between the observables and the information to be protected. The degree of protection provide...
Christelle Braun, Konstantinos Chatzikokolakis, Ca...
ISCI
2008
160views more  ISCI 2008»
13 years 9 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
INFOCOM
2006
IEEE
14 years 3 months ago
Performance of Full Text Search in Structured and Unstructured Peer-to-Peer Systems
— While structured P2P systems (such as DHTs) are often regarded as an improvement over unstructured P2P systems (such as super-peer networks) in terms of routing efficiency, it...
Yong Yang, Rocky Dunlap, Mike Rexroad, Brian F. Co...