Sciweavers

1094 search results - page 134 / 219
» List signature schemes
Sort
View
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
14 years 28 days ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
STOC
2004
ACM
134views Algorithms» more  STOC 2004»
14 years 8 months ago
Better extractors for better codes?
We present an explicit construction of codes that can be list decoded from a fraction (1 - ) of errors in sub-exponential time and which have rate / logO(1) (1/). This comes close...
Venkatesan Guruswami
BMCBI
2010
177views more  BMCBI 2010»
13 years 7 months ago
Modular composition predicts kinase/substrate interactions
Background: Phosphorylation events direct the flow of signals and metabolites along cellular protein networks. Current annotations of kinase-substrate binding events are far from ...
Yichuan Liu, Aydin Tozeren
CIVR
2009
Springer
141views Image Analysis» more  CIVR 2009»
13 years 11 months ago
Automatic retrieval of visual continuity errors in movies
Continuity errors occur in many movies and television series, in spite of careful checking by those employed to minimise them. In this work we develop a scheme for automatically d...
Lyndsey C. Pickup, Andrew Zisserman
ASIACRYPT
2008
Springer
13 years 9 months ago
Compact Proofs of Retrievability
In a proof-of-retrievability system, a data storage center must prove to a verifier that he is actually storing all of a client's data. The central challenge is to build syst...
Hovav Shacham, Brent Waters