Sciweavers

4415 search results - page 30 / 883
» How to Pair with a Human
Sort
View
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
15 years 6 months ago
How to Enrich the Message Space of a Cipher
Abstract. Given (deterministic) ciphers E and E that can encipher messages of l and n bits, respectively, we construct a cipher E∗ = XLS[E, E] that can encipher messages of l + s...
Thomas Ristenpart, Phillip Rogaway
130
Voted
ECCC
2006
109views more  ECCC 2006»
15 years 19 days ago
How to rank with few errors: A PTAS for Weighted Feedback Arc Set on Tournaments
Suppose you ran a chess tournament, everybody played everybody, and you wanted to use the results to rank everybody. Unless you were really lucky, the results would not be acyclic...
Claire Kenyon-Mathieu, Warren Schudy
99
Voted
IJON
2007
96views more  IJON 2007»
15 years 16 days ago
How do stimulus-dependent correlations between V1 neurons affect neural coding?
Nearby neurons in the visual cortex often partially synchronize their spiking activity. Despite the widespread observation of this phenomenon, its importance for visual coding and...
Fernando Montani, Adam Kohn, Matthew A. Smith, Sim...
140
Voted
INFOCOM
2010
IEEE
14 years 10 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
92
Voted
IWSEC
2007
Springer
15 years 6 months ago
Batch Pairing Delegation
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as wh...
Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smit...