RAPTOR
نویسندگان
چکیده
منابع مشابه
Summary of Raptor Codes
A fountain code produces for given set of k input symbols (x1, . . . , xk) a potentially limitless stream of output symbols z1, z2, . . .. The input and output symbols can be binary vectors of arbitrary length. Each output symbol is the sum of a randomly and independently chosen subset of the input symbols. Information describing the relations between input and output symbols is obtained at the...
متن کاملRAPTOR Technical Report
In this technical report we present RAPTOR (Rapid Three-Dimensional Orientation Resolver), which is a novel pipeline for inferring solely from 2D image data the 3D position and orientation (pose) of known classes of rigid objects for which man-made 3D models are available. There are many existing systems and techniques that attempt to infer 3D meshes and scene information from 2D image or video...
متن کاملRAPTOR: Ransomware Attack PredicTOR
Ransomware, a type of malicious software that encrypts a victim’s files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers’ operations to forecast ransomware activity. More specifi...
متن کاملRaptor Codes and Cryptographic Issues
In this paper two cryptographic methods are introduced. In the first method the precence of a certain size subgroup of persons can be checked for an action to take place. For this we use fragments of Raptor codes delivered to the group members. In the other method a selection of a subset of objects can be made secret. Also, it can be proven afterwards, what the original selection was.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Astronomy & Astrophysics
سال: 2018
ISSN: 0004-6361,1432-0746
DOI: 10.1051/0004-6361/201732149