Sciweavers

26602 search results - page 5216 / 5321
» A New Imaging Model
Sort
View
SIGIR
2004
ACM
15 years 6 months ago
Block-level link analysis
Link Analysis has shown great potential in improving the performance of web search. PageRank and HITS are two of the most popular algorithms. Most of the existing link analysis al...
Deng Cai, Xiaofei He, Ji-Rong Wen, Wei-Ying Ma
WMASH
2004
ACM
15 years 6 months ago
LOCATOR: location estimation system For wireless LANs
With the wide spread growth of mobile computing devices and local area wireless networks, wireless network providers have started to target the users with value-added services bas...
Ankur Agiwal, Parakram Khandpur, Huzur Saran
WMASH
2004
ACM
15 years 6 months ago
Smart edge server: beyond a wireless access point
Wireless access at cafes, airports, homes and businesses have proliferated all over the globe with several different Wireless Internet Service Providers. Similarly, digital media ...
Geetha Manjunath, Tajana Simunic, Venkatesh Krishn...
ACNS
2004
Springer
220views Cryptology» more  ACNS 2004»
15 years 6 months ago
Secure Conjunctive Keyword Search over Encrypted Data
Abstract. We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterio...
Philippe Golle, Jessica Staddon, Brent R. Waters
108
Voted
ASIACRYPT
2004
Springer
15 years 6 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
« Prev « First page 5216 / 5321 Last » Next »