Sciweavers

1005 search results - page 27 / 201
» Practical Secure Function Evaluation
Sort
View
CCS
2005
ACM
14 years 2 months ago
Exploiting open functionality in SMS-capable cellular networks
Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text mes...
William Enck, Patrick Traynor, Patrick McDaniel, T...
CSDA
2006
71views more  CSDA 2006»
13 years 8 months ago
Practical representations of incomplete probabilistic knowledge
This article deals with the compact representation of incomplete probabilistic knowledge which can be encountered in risk evaluation problems, for instance in environmental studie...
Cédric Baudrit, Didier Dubois
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
14 years 1 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto
IJSN
2006
124views more  IJSN 2006»
13 years 8 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
NIPS
2008
13 years 10 months ago
Overlaying classifiers: a practical approach for optimal ranking
ROC curves are one of the most widely used displays to evaluate performance of scoring functions. In the paper, we propose a statistical method for directly optimizing the ROC cur...
Stéphan Clémençon, Nicolas Va...