Filters








23 Hits in 8.0 sec

Client-aided Robust Bit-composition Protocol with Deterministic Cheater Identification in Standard Model

Hikaru Tsuchida, Takashi Nishide
2021 Journal of Information Processing  
In this paper, we propose a novel bit-composition protocol with robustness independent of a statistical parameter by introducing additional clients generating the pair of shares of random values only in  ...  We also propose a protocol for the Hamming distance with robustness by modifying our bit-composition protocol. It can achieve a secure iris recognition service via MPC with robustness.  ...  Our Results In this paper, we propose a client-aided bit-composition protocol with private robustness independent of a statistical parameter that is provably secure in the standard model.  ... 
doi:10.2197/ipsjjip.29.515 fatcat:qlqgqqw6ynefzdtmwfzh7zhmzi

Reducing Efficiency of Connectivity-Splitting Attack on Newscast via Limited Gossip [chapter]

Jakub Muszyński, Sébastien Varrette, Pascal Bouvry
2016 Lecture Notes in Computer Science  
Indeed, a set of recent studies emphasized the hard-wired vulnerabilities of the protocol, leading to an efficient implementation of a malicious client, where a few naive cheaters are able to break the  ...  against the standard representation in a number of financial time-series modelling tasks.  ... 
doi:10.1007/978-3-319-31204-0_20 fatcat:27rnwllk75cv5kncys2u7utreq

Prêt à Voter Providing Everlasting Privacy [chapter]

Denise Demirel, Maria Henning, Jeroen van de Graaf, Peter Y. A. Ryan, Johannes Buchmann
2013 Lecture Notes in Computer Science  
Hugo Jonker for organising a PhD workshop on voting in 2012 at which the authors of this paper met and came up with the ideas for this paper.  ...  Ashish Choudhary for comments on multi-party computation, Markulf Kohlweiss for comments on the design of the CKLM12/13 protocols and Dr.  ...  cheaters [32] .  ... 
doi:10.1007/978-3-642-39185-9_10 fatcat:5dkjajb5rjfstef4csslxlu4cm

Rapid testing for group B streptococcus during labour: a test accuracy study with evaluation of acceptability and cost-effectiveness

J Daniels, J Gray, H Pattison, T Roberts, E Edwards, P Milner, L Spicer, E King, RK Hills, R Gray, L Buckley, L Magill (+6 others)
2009 Health Technology Assessment  
You can order HTA monographs from our Despatch Agents: -fax (with credit card or official purchase order) -post (with credit card or official purchase order or cheque) -phone during office hours (credit  ...  Printed copies of HTA monographs cost £20 each (post and packing free in the UK) to both public and private sector purchasers from our Despatch Agents.  ...  Women's hand-held notes were marked with coloured stickers to identify whether they had provisionally consented or declined, thereby aiding identification of women to be reapproached for consent at presentation  ... 
doi:10.3310/hta13420 pmid:19778493 fatcat:b4cjxhf22vejvl7qujgossuouu

Abstracts of Working Papers in Economics

2003 Abstracts of Working Papers in Economics  
We argue that this model provides an interpretation for why Britain, Germany and the US industrialized during the nineteenth century, while the landed aristocracy in Russia and Austria-Hungary blocked  ...  AB We construct a simple model where political elites may block technological and institutional development, because of a "political replacement effect."  ...  Such models arise in empirical econometric studies of firm size and in dynamic panel data modeling with weak instruments.  ... 
doi:10.1017/s0951007900006069 fatcat:2xvyn2ei3rfynkh5ku4ssehk7u

LIPIcs, Volume 230, ITC 2022, Complete Volume [article]

Dana Dachman-Soled
2022
Using [24], the protocol is also secure in the perfect adaptive setting with efficient simulation and with universal composability.  ...  Acknowledgements We are thankful to Siyao Guo for clarifications regarding the known techniques for establishing lower bounds for problems in the generic group model with preprocessing.  ...  P 1 P 2 A Figure 1 Illustration of inconsistent cheater identification.  ... 
doi:10.4230/lipics.itc.2022 fatcat:essd7vkxajblve2oviyqqe2o3e

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+36 others)
2016 unpublished
Acknowledgments This research was supported in part by the National Nature Science Foundation of China (grant number: 61202228) and the College Natural Science Key Project of Anhui Province of China (grant  ...  Acknowledgments The research work was supported by New Century Excellent Talents Acknowledgments The work described in this paper was supported by the Key program of National Science Fund of Tianjin  ...  PAKE protocol over standard model using chaotic maps.  ... 
fatcat:xjcy7wc2hzbhzl3bfxwniqvjhy

*Inform atica An International Journal of Computing and Informatics pecial Issue: Cryptology and Network Security Guest Editors

Francesco Bergadano, Chuan-Kun Wu
2002 unpublished
Acknowledgements The authors acknovvledge the support of the British Telecommunications plc. who funded this work and the help of the subjects who took part in the empirical study.  ...  Protocol 3 (Identification) On finding a redistributed copy, M extracts emb.  ...  If above three verifications in the identification protocols are valid, then the owner of the public key yg is accused.  ... 
fatcat:vhqpwpgjyreipdpafwxoiu6qy4

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+97 others)
2016 International Journal of Network Security   unpublished
Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy  ...  Then a new PPS authenticated key agreement protocol is given based on chaotic maps. Security of the scheme is based on chaotic maps hard problems and a secure one way hash function.  ...  They took the IBS in standard model proposed by Paterson and Schuldt [32] and IBE in standard model proposed by Kiltz and Vahlis [18] .  ... 
fatcat:3gborlznmrac3ebiwzxjjy5jly

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+77 others)
2017 International Journal of Network Security   unpublished
A secret image sharing with deep-steganography and two-stage authentication based on matrix encoding is proposed.  ...  Different from the common schemes which directly use LSBs replacement, our scheme performs deep-steganography, which hides 3-bit secret data but only modifies at most 1-bit via matrix encoding.  ...  In Acknowledgement The authors would like to thank the anonymous reviewers for their useful comments.  ... 
fatcat:btwmayvuhzbotmhejwow3wbldq

) 1. Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving Hongfeng Zhu 1001-1009 A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption Qiao Peng

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+91 others)
2016 International Journal of Network Security   unpublished
, but is also robust to resist various attacks and achieves perfect forward secrecy with privacy preserving.  ...  In this paper, we propose the first chaotic maps-based group authentication key agreement protocol.  ...  To begin with, we describe the system model used in the enhanced scheme. Das scheme uses a client-server model consisting of a remote server and many clients.  ... 
fatcat:nivpmyymvvecpft6npkuhw7smi

Special Issue: Multimedia Information System Security

Shiguo Lian, Dimitris Kanellopoulos, Giancarlo Ruffo, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Editorial Board, Juan Carlos, Augusto, Argentina (+29 others)
2009 unpublished
Acknowledgement This work was supported by the Slovenian Research Agency (ARRS), development project M2-0210 (C) entitled "AvID: Audiovisual speaker identification and emotion detection for secure communications  ...  Mixture model identification [43] .  ...  The adversary model considered here is composed by nodes in the DHT system (with reference to Kademlia) that do not properly follow the protocol.  ... 
fatcat:ekua3zeo5rfnvcycdaxfmhjihq

Dagstuhl Reports, Volume 7, Issue 6, June 2017, Complete Issue [article]

2018
Exploring the kd45 property of a kripke model after the execution of an action sequence. In AAAI, pages 1604-1610, 2015. Siddharth Srivastava.  ...  Frontiers in Psychology, 7:748, 2016. Tran Cao Son, Enrico Pontelli, Chitta Baral, and Gregory Gelfond. Finitary s5-theories. In European Workshop on Logics in Artificial Intelligence, pages 239-252.  ...  In addition to centralized access to RDF datasets, Web-based protocols such as the SPARQL protocol enable software clients to access or to query RDF datasets made available by remote servers.  ... 
doi:10.4230/dagrep.7.6 fatcat:5ovvse5smzhxppthq2tu6i4icm

Zeitschriftenlese

2014 Medien & Kommunikationswissenschaft  
In the UK, it is often articulated employing strategies commonly associated with crime news narratives, and centred on images of individual cheaters.  ...  (standard condition) while the other half watched in French with English subtitles (subtitled condition).  ...  We examine these questions with data from the effects of advertising in the 2000 presidential election and 2006 subnational elections, but argue that our model and results are broadly applicable within  ... 
doi:10.5771/1615-634x-2014-2-308 fatcat:a2w573pzsbeqbahxiq7ztnkgm4

Twenty-ninth International Conference INFORMATION AND COMMUNICATION TECHNOLOGIES AND PROGRAMMING ICT&P 2004 Proceedings FOI-COMMERCE SOFIA-2004

Bulgaria Varna
unpublished
Till now more than 300 papers of more than 500 authors have been published in 10 volumes.  ...  IJ ITA authors are widespread in 34 countries all over the world: Armenia, Belarus, Belgium, Bulgaria, Canada, Czech Republic, Egypt, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Israel  ...  This result is effective because the user has to send logN bits to the server in order to address the i-th bit independently from the protocol includes the feature of keeping the data privacy or not. 3  ... 
fatcat:hadzyuwqdbd5nmok2jxeeetcli
« Previous Showing results 1 — 15 out of 23 results