Sciweavers

157 search results - page 26 / 32
» A Universally Composable Mix-Net
Sort
View
81
Voted
IADIS
2004
14 years 11 months ago
Towards interoperability of wireless services - a description model of service interfaces
Web services are evolving quickly in terms of standardization. Technology and wireless networks exact requirements upon web services used via wireless connections, such as mobile ...
Anne Immonen, Jarkko Holappa, Päivi Kallio, J...
90
Voted
NIPS
1993
14 years 11 months ago
Robust Reinforcement Learning in Motion Planning
While exploring to nd better solutions, an agent performing online reinforcement learning (RL) can perform worse than is acceptable. In some cases, exploration might have unsafe, ...
Satinder P. Singh, Andrew G. Barto, Roderic A. Gru...
80
Voted
CCS
2010
ACM
14 years 10 months ago
A new framework for efficient password-based authenticated key exchange
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. The...
Adam Groce, Jonathan Katz
FOCS
2007
IEEE
15 years 4 months ago
Cryptography from Sunspots: How to Use an Imperfect Reference String
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Ran Canetti, Rafael Pass, Abhi Shelat
97
Voted
CIKM
2005
Springer
15 years 3 months ago
Maximal termsets as a query structuring mechanism
Search engines process queries conjunctively to restrict the size of the answer set. Further, it is not rare to observe a mismatch between the vocabulary used in the text of Web p...
Bruno Pôssas, Nivio Ziviani, Berthier A. Rib...