![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Application of machine learning techniques to predict the temperature distribution in semi-rigid pavement with a cement-treated base
Due to the visco-elastic properties of asphalt concrete (AC), its strength is reduced exponentially along with the increased temperatures. Including cement-treated base (CTB) will improve the whole pavement st...
-
Chapter and Conference Paper
Constructing Leakage-Resilient Shamir’s Secret Sharing: Over Composite Order Fields
Probing physical bits in hardware has compromised cryptographic systems. This work investigates how to instantiate Shamir’s secret sharing so that the physical probes into its shares reveal statistically insig...
-
Chapter and Conference Paper
Randomized Functions with High Round Complexity
Consider two-party secure function evaluation against an honest-but-curious adversary in the information-theoretic plain model. We study the round complexity of securely realizing a given secure function evalu...
-
Chapter and Conference Paper
Develo** Statistical Models to Predict Temperature Distribution in Asphalt Concrete in Danang City
Asphalt concrete (AC) is a commonly used material in road construction; however, its quality is highly dependent on atmosphere temperature. Temperatures can adversely affect AC performance and its service life...
-
Chapter and Conference Paper
Secure Non-interactive Simulation from Arbitrary Joint Distributions
Secure non-interactive simulation (SNIS), introduced in EUROCRYPT 2022, is the information-theoretic analog of pseudo-correlation generators. SNIS allows parties, starting with samples of a source correlated priv...
-
Chapter and Conference Paper
Secure Non-interactive Simulation: Feasibility and Rate
A natural solution to increase the efficiency of secure computation will be to non-interactively and securely transform diverse inexpensive-to-generate correlated randomness, like, joint samples from noise sou...
-
Chapter and Conference Paper
Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family
Motivated by leakage-resilient secure computation of circuits with addition and multiplication gates, this work studies the leakage-resilience of linear secret-sharing schemes with a small reconstruction thres...
-
Chapter and Conference Paper
Develo** an Apparatus to Determine Thermal Diffusivity of Paving Materials
Temperature changes affect pavement performance such as strength reduction at elevated temperature or crack initiation and development at low thermal conditions. Thermal diffusivity of paving materials is one ...
-
Chapter and Conference Paper
Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages
Efficient Reed-Solomon code reconstruction algorithms, for example, by Guruswami and Wootters (STOC–2016), translate into local leakage attacks on Shamir secret-sharing schemes over characteristic-2 fields. Ho...
-
Chapter and Conference Paper
Secure Computation with Constant Communication Overhead Using Multiplication Embeddings
Secure multi-party computation (MPC) allows mutually distrusting parties to compute securely over their private data. The hardness of MPC, essentially, lies in performing secure multiplications over suitable a...
-
Chapter and Conference Paper
Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)
Most secure computation protocols can be effortlessly adapted to offload a significant fraction of their computationally and cryptographically expensive components to an offline phase so that the parties can r...
-
Chapter and Conference Paper
Secure Computation Based on Leaky Correlations: High Resilience Setting
Correlated private randomness, or correlation in short, is a fundamental cryptographic resource that helps parties compute securely over their private data. An offline preprocessing step, which is independent ...
-
Chapter and Conference Paper
A Lightweight Treatment of Inexact Dates
This paper presents a lightweight approach to representing inexact dates on the semantic web, in that it imposes minimal ontological commitments on the ontology author and provides data that can be queried using ...
-
Chapter and Conference Paper
CURIOS Mobile: Linked Data Exploitation for Tourist Mobile Apps in Rural Areas
As mobile devices proliferate and their computational power has increased rapidly over recent years, mobile applications have become a popular choice for visitors to enhance their travelling experience. Howeve...
-
Chapter and Conference Paper
Belief Revision in a Fact-Rule Agent’s Belief Base
When there is much incoming information with different levels of reliability, the agent’s belief base could become inconsistent, and therefore it needs a revision procedure. The algorithm which implements this...