Sciweavers

619 search results - page 71 / 124
» Learning with Security
Sort
View
ICIP
2009
IEEE
14 years 10 months ago
Age Regression From Faces Using Random Forests
Predicting the age of a person through face image analysis holds the potential to drive an extensive array of real world applications from human computer interaction and security ...
TCC
2010
Springer
166views Cryptology» more  TCC 2010»
14 years 5 months ago
Public-Key Encryption Schemes with Auxiliary Inputs
We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one t...
Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kala...

Publication
152views
14 years 3 days ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
DIMVA
2004
13 years 10 months ago
A Honeynet within the German Research Network - Experiences and Results
: A honeynet is a special prepared network which is not used in normal business. It is a kind of playground to watch and learn the tactics of crackers. The only purpose of a honeyn...
Helmut Reiser, Gereon Volker
ASIACRYPT
2008
Springer
13 years 11 months ago
Universally Composable Adaptive Oblivious Transfer
In an oblivious transfer (OT) protocol, a Sender with messages M1, . . . , MN and a Receiver with indices 1, . . . , k [1, N] interact in such a way that at the end the Receiver ...
Matthew Green, Susan Hohenberger