Kai

Results: 4177



#Item
1Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Computational hardness assumption / Digital signature / Entropy / XTR

Efficient String-Commitment from Weak Bit-Commitment Kai-Min Chung1, , Feng-Hao Liu2, , Chi-Jen Lu3 , and Bo-Yin Yang3 1 2

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:37
2Computer network security / Cyberwarfare / Economy / Finance / Spoofing attack / Global Positioning System / Automatic dependent surveillance  broadcast / Spoof / Computer security / OpenSky Network / Flightradar24

POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System Kai Jansen Matthias Schäfer

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2017-06-18 03:58:02
3Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Chosen-plaintext attack / RSA / Ciphertext / Proxy re-encryption / Homomorphic encryption / XTR / Key encapsulation / Semantic security

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-03-27 10:44:26
4Algebra / Mathematics / Numerical linear algebra / Equations / Linear algebra / Hidden Field Equations / Multivariate cryptography / Gaussian elimination / Recurrence relation / Equation solving / APMonitor / BCD

Implementing Joux-Vitse’s Crossbred Algorithm for Solving MQ Systems over F2 on GPUs Ruben Niederhagen1 , Kai-Chun Ning2 , and Bo-Yin Yang3 1 2

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2018-05-02 19:49:44
5Information science / Information retrieval / Natural language processing / Statistical natural language processing / Computational linguistics / Semantics / Vector space model / Latent semantic analysis / Relevance / Word2vec / Tfidf / Ranking

Cluster Hypothesis in Low-Cost IR Evaluation with Different Document Representations Kai Hui Klaus Berberich

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:41:57
6Information science / Information / Library science / Business intelligence / Data management / Knowledge representation / Records management / Cataloging / Library

Libraries as Curators of Open Citations Perspectives of the Project LOC-DB in Germany Anne Lauscher, Kai Eckert, Lukas Galke, Ansgar Scherp, Syed Tahseen Raza Rizvi, Sheraz Ahmed, Andreas Dengel, Philipp Zumstein, Annett

Add to Reading List

Source URL: workshop-oc.github.io

Language: English - Date: 2018-09-10 10:16:08
7

Improved Semantic Representations From Tree-Structured Long Short-Term Memory Networks Kai Sheng Tai, Richard Socher*, Christopher D. Manning Computer Science Department, Stanford University, *MetaMind Inc. fo

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-06-01 20:23:35
    8Global Positioning System / Avionics / Finance / Economy / Money / Computer network security / Spoofing attack / Navigation / FLARM / Automatic dependent surveillance  broadcast / GPS navigation device / GPS signals

    Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Kai Jansen∗ , Matthias Sch¨afer† , Daniel Moser‡ , Vincent Lenders§ , Christina P¨opper¶ and Jens Schmitt† ∗ Ruhr-Universi

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2018-01-11 04:46:53
    9

    PDF Document

    Add to Reading List

    Source URL: www.kaiyo-kai.com

    - Date: 2018-06-11 19:46:25
      10

      PDF Document

      Add to Reading List

      Source URL: gakuyu-kai.org

      - Date: 2018-01-10 03:11:55
        UPDATE