Sciweavers

130 search results - page 25 / 26
» Learning to Trust
Sort
View
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 22 days ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
ATAL
2009
Springer
14 years 16 days ago
Producing timely recommendations from social networks through targeted search
There has been a significant increase in interest and participation in social networking websites recently. For many users, social networks are indispensable tools for sharing pe...
Anil Gürsel, Sandip Sen
FC
2009
Springer
134views Cryptology» more  FC 2009»
14 years 16 days ago
Cryptographic Combinatorial Securities Exchanges
Abstract. We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information ...
Christopher Thorpe, David C. Parkes
WABI
2001
Springer
142views Bioinformatics» more  WABI 2001»
13 years 10 months ago
Pattern Matching and Pattern Discovery Algorithms for Protein Topologies
We describe algorithms for pattern matching and pattern learning in TOPS diagrams (formal descriptions of protein topologies). These problems can be reduced to checking for subgrap...
Juris Viksna, David Gilbert
SIGCPR
1999
ACM
105views Hardware» more  SIGCPR 1999»
13 years 10 months ago
A university-based approach to the diffusion of knowledge management concepts and practice
This paper addresses the diffusion of Knowledge Management concepts, principles, and cases into university courses. Although we are now living in a world of gigabit transmission s...
Stephen Ruth, Jeffrey Theobald, Virgil Frizzell