Sciweavers

2702 search results - page 115 / 541
» Message from the Editor
Sort
View
IJNSEC
2010
128views more  IJNSEC 2010»
14 years 10 months ago
New Efficient Searchable Encryption Schemes from Bilinear Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu
144
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Detection of anomalous events from unlabeled sensor data in smart building environments
This paper presents a robust unsupervised learning approach for detection of anomalies in patterns of human behavior using multi-modal smart environment sensor data. We model the ...
Padmini Jaikumar, Aca Gacic, Burton Andrews, Micha...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 6 months ago
Online Ciphers from Tweakable Blockciphers
Abstract. Online ciphers are deterministic length-preserving permutations EK : ({0, 1}n )+ → ({0, 1}n )+ where the i-th block of ciphertext depends only on the first i blocks of...
Phillip Rogaway, Haibin Zhang
CIA
2007
Springer
15 years 9 months ago
From Local Search to Global Behavior: Ad Hoc Network Example
We introduce the Consensual N-Player Prisoner’s Dilemma as a large-scale dilemma. We then present a framework for cooperative consensus formation in large-scale MAS under the N-P...
Osher Yadgar
EUROCRYPT
2010
Springer
15 years 8 months ago
A Simple BGN-Type Cryptosystem from LWE
We construct a simple public-key encryption scheme that supports polynomially many additions and one multiplication, similar to the cryptosystem of Boneh, Goh, and Nissim (BGN). S...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan