Sciweavers

56 search results - page 9 / 12
» Cryptographic properties of nonlinear pseudorandom number ge...
Sort
View
ISW
2001
Springer
13 years 12 months ago
An Auditable Metering Scheme for Web Advertisement Applications
This paper proposes a cryptographic mechanism for metering the duration and/or the number of instances of running a data process. This mechanism has the following property: knowing...
Liqun Chen, Wenbo Mao
AUTOMATICA
2007
61views more  AUTOMATICA 2007»
13 years 7 months ago
Simultaneous stabilization of a set of nonlinear port-controlled Hamiltonian systems
This paper investigates simultaneous stabilization of a set of nonlinear port-controlled Hamiltonian (PCH) systems and proposes a number of results on the design of simultaneous s...
Yuzhen Wang, Gang Feng, Daizhan Cheng
ICS
2010
Tsinghua U.
14 years 4 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
ACISP
2001
Springer
13 years 12 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 8 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny