Sciweavers

1018 search results - page 58 / 204
» Generative unbinding of names
Sort
View
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 19 days ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
DASFAA
2011
IEEE
525views Database» more  DASFAA 2011»
13 years 19 days ago
StreamFitter: A Real Time Linear Regression Analysis System for Continuous Data Streams
In this demo, we present the StreamFitter system for real-time regression analysis on continuous data streams. In order to perform regression on data streams, it is necessary to co...
Chandima H. Nadungodage, Yuni Xia, Fang Li, Jaehwa...
NPL
2011
12 years 12 months ago
A Neural Network Scheme for Long-Term Forecasting of Chaotic Time Series
The accuracy of a model to forecast a time series diminishes as the prediction horizon increases, in particular when the prediction is carried out recursively. Such decay is faster...
Pilar Gómez-Gil, Juan Manuel Ramírez...
IACR
2011
94views more  IACR 2011»
12 years 8 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
CVPR
2012
IEEE
11 years 11 months ago
Meta-class features for large-scale object categorization on a budget
In this paper we introduce a novel image descriptor enabling accurate object categorization even with linear models. Akin to the popular attribute descriptors, our feature vector ...
Alessandro Bergamo, Lorenzo Torresani