Sciweavers

198 search results - page 18 / 40
» The Multiplicative Quantum Adversary
Sort
View
BMVC
2000
13 years 9 months ago
Building Temporal Models for Gesture Recognition
This work presents a piecewise linear approximation to non-linear Point Distribution Models for modelling the human hand. The work utilises the natural segmentation of shape space...
Richard Bowden, Mansoor Sarhadi
FTNET
2007
80views more  FTNET 2007»
13 years 7 months ago
Network Coding Applications
Network coding is an elegant and novel technique introduced at the turn of the millennium to improve network throughput and performance. It is expected to be a critical technology...
Christina Fragouli, Emina Soljanin
INDOCRYPT
2003
Springer
14 years 24 days ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
ICDM
2009
IEEE
143views Data Mining» more  ICDM 2009»
14 years 2 months ago
An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners
Abstract—Data sanitization has been used to restrict reidentification of individuals and disclosure of sensitive information from published data. We propose an attack on the pri...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
CRYPTO
2011
Springer
195views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Time-Lock Puzzles in the Random Oracle Model
Abstract. A time-lock puzzle is a mechanism for sending messages “to the future”. The sender publishes a puzzle whose solution is the message to be sent, thus hiding it until e...
Mohammad Mahmoody, Tal Moran, Salil P. Vadhan