Sciweavers

658 search results - page 47 / 132
» Open problems in the security of learning
Sort
View
ECML
2006
Springer
14 years 19 days ago
Subspace Metric Ensembles for Semi-supervised Clustering of High Dimensional Data
A critical problem in clustering research is the definition of a proper metric to measure distances between points. Semi-supervised clustering uses the information provided by the ...
Bojun Yan, Carlotta Domeniconi
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 3 months ago
Security in All-Optical Networks: Self-Organization and Attack Avoidance
—While transparent WDM optical networks become more and more popular as the basis of the Next Generation Internet (NGI) infrastructure, such networks raise many unique security i...
Jae-Seung Yeom, Ozan K. Tonguz, Gerardo A. Casta&n...
PKC
2005
Springer
110views Cryptology» more  PKC 2005»
14 years 2 months ago
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
To sign with RSA, one usually encodes the message m as µ(m) and then raises the result to the private exponent modulo N. In Asiacrypt 2000, Coron et al. showed how to build a secu...
Julien Cathalo, Jean-Sébastien Coron, David...
DRM
2008
Springer
13 years 10 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan
IEEEARES
2008
IEEE
14 years 3 months ago
Using Non-adaptive Group Testing to Construct Spy Agent Routes
We consider a network of remote agent platforms that are tested by roaming spy agents in order to identify those that are malicious, based on the outcome of each agent. It is show...
Georgios Kalogridis, Chris J. Mitchell