We introduce a computational problem of distinguishing between two specific quantum states as a new cryptographic problem to design a quantum cryptographic scheme that is “secu...
Watermarking has been used on multimedia for a variety of applications, among which intellectual property protection stands out. However, and in spite of a growing need, very few a...
We aligned two fundamentally different models of smallpox transmission after a bioterrorist attack: A location-explicit multi-agent model (BioWar) and the conventional epidemiologi...
Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Ka...
Abstract. We present a new algorithm for upper bounding the maximum average linear hull probability for SPNs, a value required to determine provable security against linear cryptan...
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...