Results 101 to 110 of about 4,491,165 (327)

Security of discrete log cryptosystems in the random oracle and the generic model [PDF]

open access: yes, 1999
We introduce novel security proofs that use combinatorial counting arguments rather than reductions to the discrete logarithm or to the Diffie-Hellman problem. Our security results are sharp and clean with no polynomial reduction times involved.
Jakobsson, Markus, Schnorr, Claus Peter
core  

Enhancing Study Design and Analysis of MR Imaging Markers Through Measurement Error Modeling

open access: yesJournal of Magnetic Resonance Imaging, EarlyView.
ABSTRACT Background Measurement error in imaging reduces statistical power and potentially biases parameter estimation, compromising study reliability. Purpose To introduce a dual data collection design (reliability and main datasets) to quantify measurement error and apply regression calibration to correct error‐prone imaging markers, thereby ...
Xiaofeng Wang   +8 more
wiley   +1 more source

Von Neumann Entropy Penalization and Low Rank Matrix Estimation [PDF]

open access: yes, 2010
A problem of statistical estimation of a Hermitian nonnegatively definite matrix of unit trace (for instance, a density matrix in quantum state tomography) is studied.
Koltchinskii, Vladimir
core   +1 more source

Toward Explainable Engineering Decisions: Pursuing a Descriptive Decision Theory at the Intersection of Analysis, Judgment, and Conviction

open access: yesSystems Engineering, EarlyView.
ABSTRACT Engineers design the technical systems that define and sustain our society. The decision‐making scenarios they face require both quantitative analyses and the consideration of qualitative factors, which are shaped by deeply held beliefs, values, and societal contexts. However, existing engineering decision‐making models, primarily derived from
Scott Ferguson   +1 more
wiley   +1 more source

AUGURAL TERRITORIES: On the Prophetic Organizing of the Mid‐range

open access: yesInternational Journal of Urban and Regional Research, EarlyView.
Abstract In this article I introduce the concept of augural territories to theorize the urbanism that emerged during pandemic lockdowns. I draw on ethnographic research in Madrid to examine how community‐based responses—including mutual aid networks, food pantries and neighbourhood associations—disrupted the spatial and temporal logics of territorial ...
Alberto Corsín Jiménez
wiley   +1 more source

Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors

open access: yesIEEE Access, 2020
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj   +1 more source

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]

open access: yes, 2017
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M.   +4 more
core   +1 more source

From politics to economics: The investigation of the determinants of local administrative hierarchy in the Tang–Song transition

open access: yesAsia‐Pacific Economic History Review, Volume 65, Issue 1, Page 39-78, March 2025.
Abstract This study collects original data to examine the determinants of classification criteria of county hierarchy and its rank variations during the Tang–Song period. The results reveal that the county hierarchy was affected by both economic and political situations, with more emphasis on politics in Tang and economics in Song.
Nan Li, Heqi Cai
wiley   +1 more source

Provable data possession scheme with authentication

open access: yesTongxin xuebao, 2016
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI   +3 more
doaj  

On Obfuscation with Random Oracles [PDF]

open access: yes, 2015
Assuming trapdoor permutations, we show that there exist function families that cannot be VBB-obfuscated even if both the obfuscator and the obfuscated program have access to a random oracle. Specifically, these families are the robust unobfuscatable families of [Bitansky-Paneth, STOC 13].
Ran Canetti   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy