Johns

Results: 5822



#Item
1Cryptography / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Padding oracle attack / RSA / Messages / Block cipher mode of operation / ICloud / Authenticated encryption / Symmetric-key algorithm

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2016-03-22 15:58:42
2Poker / Gambling / Gaming / Computer poker player / Game artificial intelligence / Cereus Poker Network / Cheating in poker / Online poker / World Series of Poker / PokerStars / Texas hold 'em / Pot

A Practical Implementation of a MultiDevice Split Application for Protecting Online Poker Gabriel Kaptchuk and Aviel Rubin Johns Hopkins University [gkaptchuk, rubin]@cs.jhu.edu

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2016-03-22 16:17:20
3Cryptography / Secure multi-party computation / Authenticated encryption / Ciphertext indistinguishability / Public-key cryptography / Cryptographic protocol / Encryption / Digital signature / Standard model / Key / Advantage

Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards Arka Rai Choudhuri Johns Hopkins University Matthew Green

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-11-10 07:57:54
4Cryptocurrencies / Cryptography / Computing / Blockchains / Economy / Decentralization / Alternative currencies / Cryptographic protocols / Secure multi-party computation / Bitcoin / Digital signature / Ledger

Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers Gabriel Kaptchuk Johns Hopkins University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-04-16 15:01:50
5Cryptography / Public-key cryptography / Digital signature / Ring signature / Group signature / Pseudorandom function family / Commitment scheme / Random oracle / Secure multi-party computation

ANONIZE: A Large-Scale Anonymous Survey System Susan Hohenberger Johns Hopkins University Steven Myers

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-07-06 21:10:31
6Information and communications technology / Computing / Ethernet / Internet architecture / Computer network / Telecommunications engineering / Network switch / Low latency / Routing / Node / Replication / Information Age

NetChain: Scale-Free Sub-RTT Coordination Xin Jin1 , Xiaozhou Li2 , Haoyu Zhang3 , Nate Foster2,4 , Jeongkeun Lee2 , Robert Soul´e2,5 , Changhoon Kim2 , Ion Stoica6 1 Johns Hopkins University, 2 Barefoot Networks, 3 Pr

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2018-02-22 15:27:09
7

Identification of PWARX Hybrid Models with Unknown and Possibly Different Orders Ren´e Vidal Center for Imaging Science, Department of Biomedical Engineering, Johns Hopkins University 308B Clark Hall, 3400 N. Charles St

Add to Reading List

Source URL: www.cis.jhu.edu

Language: English - Date: 2004-03-20 14:47:17
    8

    A BOOTSTRAP INTERVAL ESTIMATOR FOR BAYES’ CLASSIFICATION ERROR Chad M. Hawes and Carey E. Priebe Johns Hopkins University Department of Applied Mathematics and Statistics Baltimore, MDABSTRACT

    Add to Reading List

    Source URL: www.ams.jhu.edu

    Language: English - Date: 2012-08-13 11:26:25
      9

      Lecture 6.1 Loop Dependencies ENInstructor: Randal Burns 14 February 2018 Department of Computer Science, Johns Hopkins University

      Add to Reading List

      Source URL: parallel.cs.jhu.edu

      Language: English - Date: 2018-04-30 13:14:16
        10

        The Johns Hopkins CARES Mobile Safety Center: Driving Home Safety Eileen M. McDonald, MS; Associate Scientist and Director Kira McGroarty Koon, MPH, CHES; CARES Project Director Johns Hopkins Center for Injury Research a

        Add to Reading List

        Source URL: strategicfire.org

        Language: English - Date: 2015-04-09 19:01:24
          UPDATE