Sciweavers

515 search results - page 41 / 103
» Secure Parameters for SWIFFT
Sort
View
137
Voted
CCS
2009
ACM
15 years 6 months ago
The bayesian traffic analysis of mix networks
This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network ar...
Carmela Troncoso, George Danezis
124
Voted
CRYPTO
2006
Springer
97views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
Robust Multiparty Computation with Linear Communication Complexity
We present a robust multiparty computation protocol. The protocol is for the cryptographic model with open channels and a polytime adversary, and allows n parties to actively secur...
Martin Hirt, Jesper Buus Nielsen
ICPR
2008
IEEE
16 years 4 months ago
Refining PTZ camera calibration
Due to the increased need for security and surveillance, PTZ cameras are now being widely used in many domains. Therefore, it is very important for the applications like video mos...
Hassan Foroosh, Imran N. Junejo
124
Voted
EUROPAR
2004
Springer
15 years 6 months ago
Profiling Grid Data Transfer Protocols and Servers
The trend of data intensive grid applications has brought grid storage protocols and servers into focus. The objective of this study is to gain an understanding of how time is spen...
George Kola, Tevfik Kosar, Miron Livny
117
Voted
ENTCS
2006
103views more  ENTCS 2006»
15 years 2 months ago
Static Equivalence is Harder than Knowledge
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
Johannes Borgström