1,426 Result(s)
-
Chapter and Conference Paper
Correction to: Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup
-
Chapter and Conference Paper
Correction to: Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security
In an older version of this paper, there was an erroneous insertion of an equation on page 315. This has been removed.
-
Chapter and Conference Paper
Correction to: Weakly Supervised Whole Cardiac Segmentation via Attentional CNN
In the originally published version of chapter 9, by error, the author **ye Peng had been assigned affiliation no. “3” instead of “2”. This has been corrected.
-
Chapter
Accessible Privacy
End-user privacy mechanisms have proliferated in various types of devices and application domains. However, these mechanisms were often designed without adequately considering a wide range of underserved users...
-
Chapter and Conference Paper
Tree-Based Models for Pain Detection from Biomedical Signals
For medical treatments, pain is often measured by self-report. However, the current subjective pain assessment highly depends on the patient’s response and is therefore unreliable. In this paper, we propose a ...
-
Chapter and Conference Paper
Correction to: Anonymizing Global Edge Weighted Social Network Graphs
In the originally published chapter 9 some of the paragraphs were presented in their unfinished version, which affected the readability of the paper. The sections Introduction, Preliminary and References have ...
-
Chapter and Conference Paper
Correction to: Federated Learning for Non-IID Data: From Theory to Algorithm
In the originally published version of chapter 3 the second affiliation of the author Bojian Wei was incorrect. The second affiliation of the author Bojian Wei has been corrected as “School of Cyber Security, ...
-
Chapter and Conference Paper
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties
In this work, we show negative results on the tamper-resilience of a wide class of cryptographic primitives with uniqueness properties, such as unique signatures, verifiable random functions, signatures with u...
-
Chapter and Conference Paper
Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages
Efficient Reed-Solomon code reconstruction algorithms, for example, by Guruswami and Wootters (STOC–2016), translate into local leakage attacks on Shamir secret-sharing schemes over characteristic-2 fields. Ho...
-
Chapter and Conference Paper
New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption – Stronger Security and Smaller Ciphertexts
This work proposes a new lattice two-stage sampling technique, generalizing the prior two-stage sampling method of Gentry, Peikert, and Vaikuntanathan (STOC ’08). By using our new technique as a key building b...
-
Chapter and Conference Paper
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks
In this work, we first present general methods to construct information rate-1 PKE that is \(\mathsf {KDM}^{(n)}\) ...
-
Chapter and Conference Paper
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model
Xagawa and Yamakawa (PQCrypto 2019) proved the transformation \(\mathsf {SXY}\) SXY ...
-
Chapter and Conference Paper
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the preimage resistance of many hash functions, including but not limited to the full MD5, HAVAL, and Tiger, and reduced SHA-0/1/2. It...
-
Chapter and Conference Paper
Correction to: Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays
In the version of this paper that was originally published, the affiliation of Muqian Chen, Xuebin Wang, Yue Gao, and Can Zhao has been changed to: ‘School of Cyber Security, University of Chinese Academy of S...
-
Chapter and Conference Paper
How Interaction Paradigms Affect User Experience and Perceived Interactivity in Virtual Reality Environment
Interactivity is one of the major features of virtual reality (VR) comparing with traditional digital devices. Many virtual reality devices and applications provide more than one input instruments for users t...
-
Chapter and Conference Paper
CHESTNUT: Improve Serendipity in Movie Recommendation by an Information Theory-Based Collaborative Filtering Approach
The term “serendipity” has been understood narrowly in the Recommender System. Applying a user-centered approach, user-friendly serendipitous recommender systems are expected to be developed based on a good u...
-
Chapter and Conference Paper
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums
Since it was proposed in 2015 as a generalization of integral properties, the division property has evolved into a powerful tool for probing the structures of Boolean functions whose algebraic normal forms are...
-
Chapter and Conference Paper
Integration Framework of MES Toward Data Security Interoperation
The core problem of the application of MES (Manufacturing Execution System) in intelligent manufacturing systems is integration, which solves the problem of the data interoperation between the distributed manu...
-
Chapter and Conference Paper
Study on User-Centered Usability Elements of User Interface Designs in an Augmented Reality Environment
In order to complete the augmented reality (AR) user interface (UI) design simply and quickly, the usable factors were studied in this work. The main focus of interface design is to increase usability. Various...
-
Chapter and Conference Paper
Embedded Security-Critical Device Resource Isolation
At present, embedded devices have been widely used in people’s daily life, which makes more convenience for the public. However, embedded devices still have security problems, such as automatic driving accide...