Sciweavers

4415 search results - page 30 / 883
» How to Pair with a Human
Sort
View
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
14 years 5 months ago
How to Enrich the Message Space of a Cipher
Abstract. Given (deterministic) ciphers E and E that can encipher messages of l and n bits, respectively, we construct a cipher E∗ = XLS[E, E] that can encipher messages of l + s...
Thomas Ristenpart, Phillip Rogaway
ECCC
2006
109views more  ECCC 2006»
13 years 11 months ago
How to rank with few errors: A PTAS for Weighted Feedback Arc Set on Tournaments
Suppose you ran a chess tournament, everybody played everybody, and you wanted to use the results to rank everybody. Unless you were really lucky, the results would not be acyclic...
Claire Kenyon-Mathieu, Warren Schudy
IJON
2007
96views more  IJON 2007»
13 years 11 months ago
How do stimulus-dependent correlations between V1 neurons affect neural coding?
Nearby neurons in the visual cortex often partially synchronize their spiking activity. Despite the widespread observation of this phenomenon, its importance for visual coding and...
Fernando Montani, Adam Kohn, Matthew A. Smith, Sim...
INFOCOM
2010
IEEE
13 years 8 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
IWSEC
2007
Springer
14 years 5 months ago
Batch Pairing Delegation
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as wh...
Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smit...