Sciweavers

468 search results - page 59 / 94
» Security Weaknesses in Bluetooth
Sort
View
ALT
2010
Springer
13 years 10 months ago
Optimal Online Prediction in Adversarial Environments
: In many prediction problems, including those that arise in computer security and computational finance, the process generating the data is best modeled as an adversary with whom ...
Peter L. Bartlett
ICISC
2003
117views Cryptology» more  ICISC 2003»
13 years 10 months ago
Binary Tree Encryption: Constructions and Applications
Binary tree encryption (BTE), a relaxation of hierarchical identity-based encryption (HIBE), has recently emerged as a useful and intriguing primitive. On the one hand, the defini...
Jonathan Katz
COMPSEC
2004
99views more  COMPSEC 2004»
13 years 8 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...
PROVSEC
2010
Springer
13 years 6 months ago
Distinguishing Distributions Using Chernoff Information
Abstract. In this paper, we study the soundness amplification by repetition of cryptographic protocols. As a tool, we use the Chernoff Information. We specify the number of attempt...
Thomas Baignères, Pouyan Sepehrdad, Serge V...
MOC
2010
13 years 3 months ago
A numerical method for fractal conservation laws
: We consider a fractal scalar conservation law, that is to say a conservation law modified by a fractional power of the Laplace operator, and we propose a numerical method to appr...
Jérôme Droniou