Sciweavers

658 search results - page 26 / 132
» Open problems in the security of learning
Sort
View
BLISS
2009
IEEE
13 years 10 months ago
Mechatronic Security and Robot Authentication
Robot Security is becoming more and more a serious issue for many modern applications. Robot Security matters are still not intensively addressed in the published literature. The ...
Wael Adi
EUROCRYPT
2008
Springer
13 years 10 months ago
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
In the model of perfectly secure message transmission schemes (PSMTs), there are n channels between a sender and a receiver. An infinitely powerful adversary A may corrupt (observe...
Kaoru Kurosawa, Kazuhiro Suzuki
MOC
2010
13 years 3 months ago
Optimizing the double description method for normal surface enumeration
Abstract. Many key algorithms in 3-manifold topology involve the enumeration of normal surfaces, which is based upon the double description method for finding the vertices of a con...
Benjamin A. Burton
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
SRDS
1999
IEEE
14 years 1 months ago
Security Mechanisms for using Mobile Agents in Electronic Commerce
In order for mobile agents to be accepted as a basic technology for enabling electronic commerce, proper security mechanisms must be developed. Hosts must be protected from malici...
Paulo Marques, Luís Moura Silva, Joã...