Skip to main content

Showing 1–3 of 3 results for author: Schartner, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.13087  [pdf, other

    cs.LG physics.data-an

    Learning algorithms for identification of whisky using portable Raman spectroscopy

    Authors: Kwang Jun Lee, Alexander C. Trowbridge, Graham D. Bruce, George O. Dwapanyin, Kylie R. Dunning, Kishan Dholakia, Erik P. Schartner

    Abstract: Reliable identification of high-value products such as whisky is an increasingly important area, as issues such as brand substitution (i.e. fraudulent products) and quality control are critical to the industry. We have examined a range of machine learning algorithms and interfaced them directly with a portable Raman spectroscopy device to both identify and characterize the ethanol/methanol concent… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: 26 pages, 4 figures, 2 table

  2. arXiv:1810.00281  [pdf, other

    cs.CY cs.CR

    Community-Based Security for the Internet of Things

    Authors: Quanyan Zhu, Stefan Rass, Peter Schartner

    Abstract: With more and more devices becoming connectable to the internet, the number of services but also a lot of threats increases dramatically. Security is often a secondary matter behind functionality and comfort, but the problem has already been recognized. Still, with many IoT devices being deployed already, security will come step-by-step and through updates, patches and new versions of apps and IoT… ▽ More

    Submitted 29 September, 2018; originally announced October 2018.

  3. arXiv:1505.00605  [pdf, ps, other

    cs.CR

    Oblivious Lookup Tables

    Authors: Stefan Rass, Peter Schartner, Markus Wamser

    Abstract: We consider the following question: given a group-homomorphic public-key encryption $E$, a ciphertext $c=E(x,pk)$ hiding a value $x$ using a key $pk$, and a "suitable" description of a function $f$, can we evaluate $E(f(x), pk)$ without decrypting $c$? We call this an "oblivious lookup table" and show the existence of such a primitive. To this end, we describe a concrete construction, discuss its… ▽ More

    Submitted 4 May, 2015; originally announced May 2015.

    Comments: accepted for presentation at the 15th Central European Conference on Cryptology