We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Bounds on data limits for all-to-all comparison from combinatorial designs

    In situations where every item in a data set must be compared with every other item in the set, it may be desirable to store the data across a number...

    Joanne Hall, Daniel Horsley, Douglas R. Stinson in Designs, Codes and Cryptography
    Article Open access 23 May 2024
  2. Limits of Preprocessing

    Yuval Filmus, Yuval Ishai, ... Guy Kindler in computational complexity
    Article Open access 23 May 2024
  3. Model-Agnostic Utility-Preserving Biometric Information Anonymization

    The recent rapid advancements in both sensing and machine learning technologies have given rise to the universal collection and utilization of...

    Chun-Fu Chen, Bill Moriarty, ... Pierangela Samarati in International Journal of Information Security
    Article 23 May 2024
  4. Parity Permutation Pattern Matching

    Virginia Ardévol Martínez, Florian Sikora, Stéphane Vialette in Algorithmica
    Article 22 May 2024
  5. Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem

    The semidirect discrete logarithm problem (SDLP) is the following analogue of the standard discrete logarithm problem in the semidirect product...

    Muhammad Imran, Gábor Ivanyos in Designs, Codes and Cryptography
    Article Open access 21 May 2024
  6. On duplication-free codes for disjoint or equal-length errors

    Motivated by applications in DNA storage, we study a setting in which strings are affected by tandem-duplication errors. In particular, we look at...

    Wenjun Yu, Moshe Schwartz in Designs, Codes and Cryptography
    Article 21 May 2024
  7. Improved Approximation Algorithms by Generalizing the Primal-Dual Method Beyond Uncrossable Functions

    We address long-standing open questions raised by Williamson, Goemans, Vazirani and Mihail pertaining to the design of approximation algorithms for...

    Ishan Bansal, Joseph Cheriyan, ... Sharat Ibrahimpur in Algorithmica
    Article 20 May 2024
  8. Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability

    Software-defined perimeters (SDP) revolutionize network security by offering dynamic and adaptive access controls, focusing on user and device...

    Antonio Paya, Vicente-García, Alberto Gómez in International Journal of Information Security
    Article 20 May 2024
  9. BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology

    Selfish mining is when a group of miners in a blockchain system work together to cheat and get more rewards by hiding their work from others. This...

    Nadisha Madhushanie, Sugandima Vidanagamachchi, Nalin Arachchilage in International Journal of Information Security
    Article 20 May 2024
  10. Locally maximal recoverable codes and LMR-LCD codes

    Rajendra Prasad Rajpurohit, Maheshanand Bhaintwal, Charul Rajput in Designs, Codes and Cryptography
    Article 17 May 2024
  11. LCD codes and almost optimally extendable codes from self-orthogonal codes

    LCD codes and (almost) optimally extendable codes can be used to safeguard against fault injection attacks (FIA) and side-channel attacks (SCA) in...

    **nran Wang, Ziling Heng, ... Qin Yue in Designs, Codes and Cryptography
    Article 17 May 2024
  12. On Generalized Nega-Hadamard Transform and Nega-crosscorrelation

    In the construction of cryptosystems, we need functions with some cryptographically significant properties. It is known that the Global Avalanche...

    Deepmala Sharma, Mayasar Ahmad Dar in Cryptography and Communications
    Article 16 May 2024
  13. Decentralised identity federations using blockchain

    Federated Identity Management offers numerous economic benefits and convenience to Service Providers and users alike. In such federations, the...

    Mirza Kamrul Bashar Shuhan, Syed Md. Hasnayeen, ... Md Sadek Ferdous in International Journal of Information Security
    Article 16 May 2024
  14. On optimal constant weight codes derived from \(\omega \)-circulant balanced generalized weighing matrices

    Balanced generalized weight matrices are used to construct optimal constant weight codes that are monomially inequivalent to codes derived from the...

    Hadi Kharaghani, Thomas Pender, Vladimir Tonchev in Designs, Codes and Cryptography
    Article 14 May 2024
  15. Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors

    We put forward two natural generalizations of predicate encryption (PE), dubbed multi-key and multi-input PE. More in details, our contributions are...

    Danilo Francati, Daniele Friolo, ... Daniele Venturi in Journal of Cryptology
    Article Open access 14 May 2024
  16. Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation

    Advanced Persistent Threats (APTs) are stealthy, multi-step attacks tailored to a specific target. Often described as ’low and slow’, APTs remain...

    Aida Akbarzadeh, Laszlo Erdodi, ... Tore Geir Soltvedt in International Journal of Information Security
    Article Open access 14 May 2024
  17. Construction of DNA codes with multiple constrained properties

    DNA sequences are prone to creating secondary structures by folding back on themselves by non-specific hybridization of its nucleotides. The...

    Siddhartha Siddhiprada Bhoi, Udaya Parampalli, Abhay Kumar Singh in Cryptography and Communications
    Article 14 May 2024
  18. Parameterized Approximation Algorithms and Lower Bounds for k-Center Clustering and Variants

    k -center is one of the most popular clustering models. While it admits a simple 2-approximation in polynomial time in general metrics, the Euclidean...

    Sayan Bandyapadhyay, Zachary Friggstad, Ramin Mousavi in Algorithmica
    Article 13 May 2024
Did you find what you were looking for? Share feedback.