Sciweavers

12 search results - page 3 / 3
» Security in Distributed Storage Systems by Communicating a L...
Sort
View
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
13 years 11 months ago
Unifying Classical and Quantum Key Distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, ...
Matthias Christandl, Artur Ekert, Michal Horodecki...
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
14 years 2 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke