Sciweavers

1274 search results - page 156 / 255
» New Proofs for
Sort
View
CRYPTO
2005
Springer
120views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS), providing new de...
Michel Abdalla, Mihir Bellare, Dario Catalano, Eik...
FC
2010
Springer
205views Cryptology» more  FC 2010»
14 years 2 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
ISBI
2007
IEEE
14 years 4 months ago
Postprocessing of Brain White Matter Fiber Orientation Distribution Functions
By acquiring high angular resolution diffusion weighted magnetic resonance images (HARDI), Q-Ball analysis can disclose the 3D organization of fibrous tissue such as the brain whi...
Steven Delputte, Hans Dierckx, Els Fieremans, Yves...
ICALP
2010
Springer
14 years 2 months ago
Probabilistic Automata on Finite Words: Decidable and Undecidable Problems
Abstract. This paper tackles three algorithmic problems for probabilistic automata on finite words: the Emptiness Problem, the Isolation Problem and the Value 1 Problem. The Empti...
Hugo Gimbert, Youssouf Oualhadj
COLT
2000
Springer
14 years 2 months ago
Entropy Numbers of Linear Function Classes
This paper collects together a miscellany of results originally motivated by the analysis of the generalization performance of the “maximum-margin” algorithm due to Vapnik and...
Robert C. Williamson, Alex J. Smola, Bernhard Sch&...