Sciweavers

198 search results - page 30 / 40
» The Multiplicative Quantum Adversary
Sort
View
TCC
2010
Springer
179views Cryptology» more  TCC 2010»
14 years 4 months ago
Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs
A family of trapdoor functions is one-way under correlated inputs if no efficient adversary can invert it even when given the value of the function on multiple correlated inputs. T...
Yevgeniy Vahlis
ICRA
2008
IEEE
188views Robotics» more  ICRA 2008»
14 years 2 months ago
CMDragons: Dynamic passing and strategy on a champion robot soccer team
— After several years of developing multiple RoboCup small-size robot soccer teams, our CMDragons robot team achieved a highly successful level of performance, winning both the 2...
James Bruce, Stefan Zickler, Mmichael Licitra, Man...
SRDS
2007
IEEE
14 years 1 months ago
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. ...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
ESAS
2007
Springer
14 years 1 months ago
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Abstract. Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster no...
Christoph Krauß, Frederic Stumpf, Claudia M....
WWW
2010
ACM
14 years 27 days ago
Privacy in dynamic social networks
Recent work on anonymizing online social networks (OSNs) has looked at privacy preserving techniques for publishing a single instance of the network. However, OSNs evolve and a si...
Smriti Bhagat, Graham Cormode, Balachander Krishna...