Sciweavers

515 search results - page 74 / 103
» Secure Parameters for SWIFFT
Sort
View
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 9 months ago
Success Exponent of Wiretapper: A Tradeoff between Secrecy and Reliability
Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Chung Chan
EUROCRYPT
2011
Springer
13 years 15 days ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
14 years 9 months ago
Using randomized response techniques for privacy-preserving data mining
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to use the randomized response techniques to conduct the data mining computation. S...
Wenliang Du, Zhijun Zhan
AVSS
2007
IEEE
14 years 3 months ago
Improved one-class SVM classifier for sounds classification
This paper proposes to apply optimized One-Class Support Vector Machines (1-SVMs) as a discriminative framework in order to address a specific audio classification problem. Firs...
Asma Rabaoui, Manuel Davy, Stéphane Rossign...
ICALP
2007
Springer
14 years 3 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai