Sciweavers

45 search results - page 6 / 9
» Simple Functional Encryption Schemes for Inner Products
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
13 years 12 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
TMM
2008
126views more  TMM 2008»
13 years 7 months ago
Extraction of Audio Features Specific to Speech Production for Multimodal Speaker Detection
A method that exploits an information theoretic framework to extract optimized audio features using video information is presented. A simple measure of mutual information (MI) betw...
Patricia Besson, Vlad Popovici, Jean-Marc Vesin, J...
CCS
2008
ACM
13 years 9 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar
IJCAI
2007
13 years 9 months ago
Kernel Conjugate Gradient for Fast Kernel Machines
We propose a novel variant of the conjugate gradient algorithm, Kernel Conjugate Gradient (KCG), designed to speed up learning for kernel machines with differentiable loss functio...
Nathan D. Ratliff, J. Andrew Bagnell
ENTCS
2006
124views more  ENTCS 2006»
13 years 7 months ago
A New Rabin-type Trapdoor Permutation Equivalent to Factoring
Public key cryptography has been invented to overcome some key management problems in open networks. Although nearly all aspects of public key cryptography rely on the existence of...
Katja Schmidt-Samoa