Learn More
We consider perfect verifiable secret sharing (VSS) in a synchronous network of n processors (players) where a designated player called the dealer wishes to distribute a secret s among the players in a way that no t of them obtain any information, but any t + 1 players obtain full information about the secret. The round complexity of a VSS protocol is(More)
We study the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of generalized Byzantine adversaries. It is known that in the threshold adversary model, where the Byzantine adversary can corrupt upto any <i>t</i> among the <i>n</i> players (nodes), perfectly secure communication among any pair of(More)
In this paper we present an automatic Keyphrase extraction technique for English documents of scientific domain. The devised algorithm uses n-gram filtration technique, which filters sophisticated n-grams {1d<i>n</i>d4} along with their weight from the words of input document. To develop n-gram filtration technique, we have used (1) LZ78 data compression(More)
For content level access, very often database needs the query as a sample image. However, the image may contain private information and hence the user does not wish to reveal the image to the database. Private content based image retrieval (PCBIR) deals with retrieving similar images from an image database without revealing the content of the query image -(More)
We study the interplay of network connectivity and the issues related to the possibility, feasibility and optimality for unconditionally reliable message transmission (URMT) and unconditionally secure message transmission (USMT) in an undirected synchronous network, under the influence of an adap-tive mixed adversary A (t b ,t o ,t f ,t p) , who has(More)
The Maximum-Flow problem is a classical problem in com-binatorial optimization and has many practical applications. We introduce a new variant of this well known Maximum-Flow problem, viz., the Maximum-Equal-Flow problem,wherein, for each vertex (other than the source) in the network, the actual flows along the arcs emanating from that vertex are(More)
We consider AESOP Task as Topic based evaluation of information content. Means at first stage, we identify the topics covered in given model/reference summary and calculate their importance. At the next stage, we calculate the information coverage in test / machine generated summary, w.r.t. every identified topic. We use the local importance of words in(More)
—Most of the video encryptions algorithms considered in the literature significantly increase the video size independent of encryption algorithm employed. This is because these algorithms encrypt DCTs without considering their characteristics or relationship to the visual content. This adversely affects the transmission throughput. We propose a fast video(More)