Erik Kline
YOU?
Author Swipe
View article: HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security
HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security Open
We construct an efficient proxy re-encryption (PRE) scheme secure against honest re-encryption attacks (HRA-secure) with precise concrete security estimates. To get these precise concrete security estimates, we introduce the tight, fine-gr…
View article: Max Shulman, <i>The American Pipe Dream: Performance of Drug Addiction, 1890 – 1940</i>
Max Shulman, <i>The American Pipe Dream: Performance of Drug Addiction, 1890 – 1940</i> Open
In "Plato's Pharmacy" (1981), Jacques Derrida deconstructs the pharmakon in Plato's work.He notes that the signifier has many different, even contradictory meanings, such as signifying both remedy and poison.He says the "pharmakon is the m…
View article: Priority-Based Search for the Virtual Network Embedding Problem
Priority-Based Search for the Virtual Network Embedding Problem Open
The Virtual Network Embedding (VNE) problem is a constrained optimization problem. It arises in the context of allocating resources on heterogeneous physical networks to provide end-to-end computing services. In this paper, we introduce a …
View article: SDN in the stratosphere
SDN in the stratosphere Open
The Loon project provided 4G LTE connectivity to under-served regions in emergency response and commercial mobile contexts using base stations carried by high-altitude balloons. To backhaul data, Loon orchestrated a moving mesh network of …
View article: Conflict-Based Search for the Virtual Network Embedding Problem
Conflict-Based Search for the Virtual Network Embedding Problem Open
In emerging network virtualization architectures, service providers will be able to create many heterogeneous virtual networks and offer customized end-to-end services by leasing shared resources from infrastructure providers. The Virtual …
View article: Bin2vec: learning representations of binary executable programs for security tasks
Bin2vec: learning representations of binary executable programs for security tasks Open
View article: Bin2vec: Learning Representations of Binary Executable Programs for\n Security Tasks
Bin2vec: Learning Representations of Binary Executable Programs for\n Security Tasks Open
Tackling binary program analysis problems has traditionally implied manually\ndefining rules and heuristics, a tedious and time-consuming task for human\nanalysts. In order to improve automation and scalability, we propose an\nalternative …
View article: Towards Learning Representations of Binary Executable Files for Security Tasks.
Towards Learning Representations of Binary Executable Files for Security Tasks. Open
Tackling binary analysis problems has traditionally implied manually defining rules and heuristics. As an alternative, we are suggesting using machine learning models for learning distributed representations of binaries that can be applica…