Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Joshua Lampkins"'
Autor:
Rodolfo Valiente, Darren Chan, Alan Perry, Joshua Lampkins, Sasha Strelnikoff, Jiejun Xu, Alireza Esna Ashari
Publikováno v:
IEEE Open Journal of Intelligent Transportation Systems, Vol 4, Pp 611-625 (2023)
As autonomous vehicles (AVs) become increasingly prevalent on the roads, their ability to accurately interpret and understand traffic signs is crucial for ensuring reliable navigation. While most previous research has focused on addressing specific a
Externí odkaz:
https://doaj.org/article/8127f3cff22e40a0a923741d82eb1d53
Publikováno v:
2022 IEEE International Conference on Big Data (Big Data).
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783319281650
ACNS
ACNS
Proactive secret sharing (PSS) schemes are designed for settings where long-term confidentiality of secrets is required, specifically, when all participating parties may eventually be corrupted. PSS schemes periodically refresh secrets and reset corr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c1e7de1fa04027fc927915ecd1d01e0e
https://doi.org/10.1007/978-3-319-28166-7_2
https://doi.org/10.1007/978-3-319-28166-7_2
Autor:
Joshua Lampkins, Karim El Defraw
Publikováno v:
ICNP
In this paper we argue that privacy-preserving digital coins with low computation and communication overhead can be utilized as micropayments to harden online applications and services. We call such digital coins App Coins, and the applications that
Publikováno v:
PODC
In PODC 1991 Ostrovsky and Yung [35] introduced the proactive security model, where corruptions spread throughout the network, analogous to the spread of a virus or a worm. PODC 2006 distinguished lecture by Danny Dolev, that also appears in the PODC
Autor:
Rafail Ostrovsky, Joshua Lampkins
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319108780
SCN
SCN
A multiparty computation (MPC) protocol allows a set of players to compute a function of their inputs while keeping the inputs private and at the same time securing the correctness of the output. Most MPC protocols assume that the adversary can corru
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::254237b0edf8eb32096564c7d09bcad5
https://doi.org/10.1007/978-3-319-10879-7_10
https://doi.org/10.1007/978-3-319-10879-7_10