搜索结果: 1-15 共查到“the Foundations”相关记录118条 . 查询时间(0.171 秒)
Obstacle Course Training Helps Athletes Develop Foundations for All Sports(图)
Training Youth Athletes OCR
2024/12/13
Obstacle Course Racing (OCR) has garnered a reputation for being a rather grueling event to partake. Take one of the most popular organizations, Spartan Race, and one will notice that it is geared tow...
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs
Ring Confidential Transactions Log-size Proofs
2019/5/31
Monero is the largest cryptocurrency with built-in cryptographic privacy features. The transactions are authenticated using spend proofs, which provide a certain level of anonymity by hiding the sourc...
One of the main challenges that hinder further adaption of decentralized cryptocurrencies is scalability. Because current cryptocurrencies require that all transactions are processed and stored on a d...
Onion-AE: Foundations of Nested Encryption
Anonymity authenticated encryption onion routing
2018/2/6
Nested symmetric encryption is a well-known technique for low-latency communication privacy. But just what problem does this technique aim to solve? In answer, we provide a provable-security treatment...
Foundations of Homomorphic Secret Sharing
homomorphic secret sharing, secure computation, communication complexity
2018/1/2
Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic encryption. An HSS scheme supports a local evaluation of functions on shares of one or more secret inputs, such that the ...
Privacy Notions for Privacy-Preserving Distributed Data Mining: Foundations and Privacy Games
privacy privacy games privacy notions
2017/11/27
It is well understood that the huge volumes of data captured in recent years have the potential to underpin significant research developments in many fields. But, to realise these benefits, all releva...
It is well-known that a program's memory access pattern can leak information about its input. To thwart such leakage, most existing works adopt the solution of oblivious RAM (ORAM) simulation. Such a ...
New NSF awards will bring together cross-disciplinary science communities to develop foundations of data science(图)
NSF awards together cross-disciplinary science communities data science
2017/9/5
The National Science Foundation (NSF) today announced $17.7 million in funding for 12 Transdisciplinary Research in Principles of Data Science (TRIPODS) projects, which will bring together the statist...
Foundations for Actively Secure Card-based Cryptography
Card-based protocols Card shuffling Secure multiparty computation
2017/5/23
Starting with the so-called “Five-Card Trick” of den Boer (EUROCRYPT 1989) for computing the AND of two players' bits, a version of secure multiparty computation in which a deck of playing cards repla...
This meeting is a follow up to symposia on Applications of Sum Rules and Scaling in Nonlinear Optics in August 2014 at Washington State University, Pullman, WA. The meeting was then renamed to Foundat...
第30届IEEE计算机安全基础研讨会(30th IEEE Computer Security Foundations Symposium)
第30届 IEEE计算机安全基础 研讨会
2017/3/31
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for th...
第二届国际主动学习研讨会(2nd International Workshop on Active Learning: Applications, Foundations and Emerging Trends)
第二届国际 主动学习 研讨会
2017/3/21
Science, technology, and commerce increasingly recognize the importance of machine learning approaches for data-intensive, evidence based decision making.
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
cryptographic protocols Design Principles
2017/3/13
We develop foundations and several constructions for security protocols that can automatically detect, without false positives, if a secret (such as a key or password) has been misused. Such construct...
Multi-Prover Interactive Proofs: Unsound Foundations
cryptographic protocols Zero-Knowledge
2017/3/9
Several Multi-Prover Interactive Proofs (MIPs) found in the literature contain proofs of soundness that are lacking. This was first observed by Crépeau, Salvail, Simard and Tapp who defined a notion o...
第三届玻利维亚深基础国际会议(Third Bolivian International Conference on Deep Foundations)
第三届 玻利维亚深基础 国际会议
2017/1/19
The theme of the conference is: Design, execution, monitoring and interpretation of deep foundation methods. Focus is on the presentation and discussion of the state-of-practice and new developments i...