Provable

Results: 110



#Item
41

A Practical Algorithm for Topic Modeling with Provable Guarantees Sanjeev Arora Rong Ge Yoni Halpern David Mimno

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2013-03-17 11:00:10
    42Game theory / Signaling game / Extensive-form game / Internal audit / Economy / Mathematics / Science and technology

    Audit Mechanisms for Provable Risk Management and Accountable Data Governance? Jeremiah Blocki, Nicolas Christin, Anupam Datta, and Arunesh Sinha Carnegie Mellon University, Pittsburgh, PA {jblocki, nicolasc, danupam, ar

    Add to Reading List

    Source URL: www.contrib.andrew.cmu.edu

    Language: English - Date: 2012-12-27 16:06:20
    43

    Provable post-quantum security Renato Renner Institute for Theoretical Physics

    Add to Reading List

    Source URL: pqc2010.cased.de

    Language: English - Date: 2010-06-02 01:48:25
      44

      Adapting Helios for provable ballot privacy David Bernhard1 , V´eronique Cortier2 , Olivier Pereira3 , Ben Smyth2 , Bogdan Warinschi1 1 3

      Add to Reading List

      Source URL: bensmyth.com

      Language: English - Date: 2012-08-05 15:41:25
        45

        Supplemental Material for “A Practical Algorithm for Topic Modeling with Provable Guarantees” Sanjeev Arora Rong Ge Yoni Halpern

        Add to Reading List

        Source URL: cs.nyu.edu

        Language: English - Date: 2013-03-17 11:00:11
          46

          Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

          Add to Reading List

          Source URL: web.spms.ntu.edu.sg

          Language: English - Date: 2012-08-24 06:11:58
            47

            Provable Bounds for Portable and Flexible Privacy-Preserving Access Rights ∗ Marina Blanton Mikhail J. Atallah

            Add to Reading List

            Source URL: www.cse.nd.edu

            Language: English - Date: 2007-08-02 16:59:41
              48Cryptography / Serge Vaudenay / Provable security / Zhang Fangguo / Cryptographic primitive / Willy Susilo / Block cipher / Cryptographic hash function

              - Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a

              Add to Reading List

              Source URL: security-lab.jaist.ac.jp

              Language: English - Date: 2015-08-13 01:39:17
              49

              A Provable-Security Analysis of Intel’s Secure Key RNG Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu Abstract. We provide the first provable-secu

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-02-17 19:30:26
                50

                A web-application architecture for Secure Cloud Computing Provable regulatory compliance!

                Add to Reading List

                Source URL: www.strongauth.com

                Language: English - Date: 2016-02-25 17:41:54
                  UPDATE