Sciweavers

5665 search results - page 1059 / 1133
» Introduction to Computer Security
Sort
View
ASIACRYPT
2010
Springer
13 years 6 months ago
The Round Complexity of Verifiable Secret Sharing: The Statistical Case
We consider the round complexity of a basic cryptographic task: verifiable secret sharing (VSS). This well-studied primitive provides a good "test case" for our understan...
Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan
CCR
2010
128views more  CCR 2010»
13 years 6 months ago
The 2nd workshop on active internet measurements (AIMS-2) report
On February 8-10, 2010, CAIDA hosted the second Workshop on Active Internet Measurements (AIMS-2) as part of our series of Internet Statistics and Metrics Analysis (ISMA) workshop...
kc claffy, Emile Aben, Jordan Augé, Robert ...
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 6 months ago
Personalized Data Set for Analysis
Data Management portfolio within an organization has seen an upsurge in initiatives for compliance, security, repurposing and storage within and outside the organization. When suc...
Vishal Gupta, Ashutosh Saxena
IJISEC
2010
159views more  IJISEC 2010»
13 years 6 months ago
A generalization of Paillier's public-key system with applications to electronic voting
We propose a generalization of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme e...
Ivan Damgård, Mads Jurik, Jesper Buus Nielse...
ISF
2010
164views more  ISF 2010»
13 years 6 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu
« Prev « First page 1059 / 1133 Last » Next »