Sciweavers

472 search results - page 69 / 95
» The Case for Informed Transport Protocols
Sort
View
FOCS
2009
IEEE
14 years 2 months ago
Extracting Correlations
Abstract— Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two cor...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
IPMI
1999
Springer
14 years 8 months ago
New Variants of a Method of MRI Scale Normalization
One of the major drawbacks of Magnetic Resonance Imaging (MRI) has been the lack of a standard and quantifiable interpretation of image intensities. This causes many difficulties i...
Jayaram K. Udupa, László G. Ny&uacut...
ACISP
2007
Springer
14 years 1 months ago
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users
We propose the first single sign-on system in which a user can access services using unlinkable digital pseudonyms that can all be revoked in case she abuses any one service. Our ...
Stefan Brands, Liesje Demuynck, Bart De Decker
STOC
2006
ACM
141views Algorithms» more  STOC 2006»
14 years 8 months ago
Zero-knowledge against quantum attacks
It is proved that several interactive proof systems are zero-knowledge against general quantum attacks. This includes the Goldreich?Micali?Wigderson classical zero-knowledge proto...
John Watrous
EMS
2009
IEEE
14 years 2 months ago
Modelling Periodic Data Dissemination in Wireless Sensor Networks
—Epidemic-based communications, or “gossiping”, provides a robust and scalable method for maintaining a knowledge base in a sensor network faced with an unpredictable network...
Graham Williamson, Davide Cellai, Simon A. Dobson,...