Sciweavers

691 search results - page 121 / 139
» A New Security Model for Authenticated Key Agreement
Sort
View
EUROCRYPT
2007
Springer
15 years 5 months ago
Batch Verification of Short Signatures
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Jan Camenisch, Susan Hohenberger, Michael Ø...
MT
2010
100views more  MT 2010»
14 years 12 months ago
Exploiting syntactic relationships in a phrase-based decoder: an exploration
Phrase-based decoding is conceptually simple and straightforward to implement, at the cost of drastically oversimplified reordering models. Syntactically aware models make it pos...
Tim Hunter, Philip Resnik
CCS
2010
ACM
15 years 8 months ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...
IJNSEC
2006
205views more  IJNSEC 2006»
15 years 1 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
ECIR
2010
Springer
15 years 2 months ago
Aggregation of Multiple Judgments for Evaluating Ordered Lists
Abstract. Many tasks (e.g., search and summarization) result in an ordered list of items. In order to evaluate such an ordered list of items, we need to compare it with an ideal or...
Hyun Duk Kim, ChengXiang Zhai, Jiawei Han