Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:
To receive your credentials via mail again, please click here.
You can also access the full news archive.
visual quality of VCS. At last, average contrast associated with variance is used as a new criterion to evaluate the visual quality of VCS.
The threshold gap $g$ is defined as $r-t$, where $r$ is minimal and $t$ is maximal such that
the following holds: for a secret with arbitrary a priori distribution, each $r$-subset of players can
reconstruct this secret from their joint shares without error ($r$-reconstruction) and the information
gain about the secret is nil for each $t$-subset of players jointly ($t$-privacy).
Our first bound, which is completely general, implies that if $1\\leq t
A premier center for commercial innovation, PARC, a Xerox company, is in the business of breakthroughs. We work closely with global enterprises, entrepreneurs, government agencies and partners, and other clients to invent, co-develop, and bring to market game-changing innovations by combining imagination, investigation, and return on investment for our clients. For 40 years, we have lived at the leading edge of innovation, merging inquiry and strategy to pioneer technological change. PARC was incorporated in 2002 as a wholly owned independent subsidiary of Xerox Corporation – enabling us to continue pioneering technological change but across a broader set of industries and clients today.
Depending on seniority, the successful candidate will be responsible for one or more of the following roles:
. Formulating research problems based on real-world needs and independently conducting high-quality research
. Working with existing research and development staff on a broad range of research topics
. Working with business development team in identifying important business opportunities with industry and government agencies.
. Identifying new promising research directions and contributing them to the group’s long-term research agenda.
Candidates in all areas of cyber security will be considered, however, the following areas are of particular interest:
. Systems & network security
. Security in cloud computing
. Data mining and machine learning applied to security and privacy
. Security and privacy in ubiquitous and mobile computing environments
. Formal methods and software
Our method is based on the researches in key-leakage resilience. It thus gives an interesting and rather surprised connection between the rich domain of key-leakage resilient cryptography and Pirates 2.0. We first formalize the notion of key-leakage resilient revoke system and then identify sufficient conditions so that a key-leakage resilient revoke scheme can resist Pirates 2.0 in any form. We finally propose a construction of a secure key-leakage resilient identity-based revoke system that fulfills the required conditions. The main ingredient in the construction relies on the identity-based encryption with wildcards ($\\WIBE$) and our construction of key-leakage resilient $\\WIBE$ could be useful in its own right.